Zoom for Mac patches get-root bug – update now!
August 15 2022There's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
Read moreThere's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
Read moreThere's many a slip 'twixt the cup and the lip. Or at least between the TOC and the TOU...
Read moreScammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught.
No one knows how common this scam...
Read moreHere's how to flip the tide and tap open source intelligence to protect your users.
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking as part of a Geneva Centre for Security Policy course on Cyber Security in...
Read moreAttacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
Read moreI think the U is forced: SQUID consists of five steps: Stop, Question, Understand, Imagine, and Decide. As usual, you can also use this squid post to talk about the security...
Read moreDuston Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the many vulnerability disclosure issues making patch prioritization a nightmare scenario for...
Read moreGitHub, the owner of the Node Package Manager (npm), proposes cryptographically linking source code and JavaScript packages in an effort to shore up supply chain security.
Read moreThe Department of Homeland Security (DHS) is urging states and localities to beef up security around proprietary devices that connect to the Emergency Alert System -- a national public...
Read more
Recent Comments