Latest epsiode - listen (or read) now!
Read moreOn the Subversion of NIST by the NSA
June 23 2022Nadiya Kostyuk and Susan Landau wrote an interesting paper: “Dueling Over DUAL_EC_DRBG: The Consequences of Corrupting a Cryptographic Standardization Process“:
Abstract: In recent decades, the U.S. National Institute of...
Read more
Organizations may not encounter malware targeting cloud systems or networking equipment frequently, but the array of malware they encounter just occasionally are no less disruptive or damaging. That is...
Read moreA voicemail-themed phishing campaign is hitting specific industry verticals across the country, bent on scavenging credentials that can be used for a range of nefarious purposes.
Read moreSynopsys Completes Acquisition of WhiteHat Security
June 22 2022Addition of WhiteHat Security provides Synopsys with SaaS capabilities and dynamic application security testing (DAST) technology.
Read moreAqua Security Collaborates With Center for Internet Security to Create Guide for Software Supply Chain Security
June 22 2022In addition, Aqua Security unveiled a new open source tool, Chain-Bench, for auditing the software supply chain to ensure compliance with the new CIS guidelines.
Read moreOpen service generates free report detailing potential gaps in compliance, configuration, and security for a user’s multiple domain names.
Read moreResearchers have spotted the threat group, also known as Fancy Bear and Sofacy, using the Windows MSDT vulnerability to distribute information stealers to users in Ukraine.
Read moreDon't sleep on Magecart attacks, which security teams could miss by relying solely on automated crawlers and sandboxes, experts warn.
Read moreTreat identity management as a first-priority problem, not something to figure out later while you get your business up and running in the cloud.
Read more
Recent Comments