A critical security bug could lead to remote device control, altered lab results, and more, putting patients in danger, agency warns.
Read moreWhat Counts as “Good Faith Security Research?”
June 3 2022The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act (CFAA), a 1986 law that remains the primary statute...
Read moreMe on Public-Interest Tech
June 3 2022Back in November 2020, in the middle of the COVID-19 pandemic, I gave a virtual talk at the International Symposium on Technology and Society: “The Story of the Internet...
Read moreThe latest iteration of CMD-based ransomware is sophisticated and tricky to detect – and integrates token theft and worming capabilities into its feature set.
Read moreDataLenz delivers real-time, machine learning-based breach detection with user behavior modeling for IBM zSystems.
Read moreZero-day announced - here's what you need to know
Read moreThe attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a...
Read moreAn unpatched remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential harvesting, cyber espionage, and network backdoor attacks.
Read moreIf you want your IT and security administrators to get buried in trivial workloads and productivity bottlenecks, having poor network object management is a great way to accomplish that.
Read moreFor Ransomware, Speed Matters
June 3 2022Someone interested in putting together a ransomware campaign has to consider several factors. The LockBit group touts its speed over competing families to attract potential buyers for its ransowmare-as-a-service.
Read more
Recent Comments