The exploit requires a specific nonstandard configuration to work, limiting the danger it poses, but future research could turn up more broadly usable attacks.
Read moreRansomware: Should Companies Ever Pay Up?
March 31 2022Ransomware is a major threat, and no business is "too small to target." So what should you do after an attack? Is negotiating with criminals ever the answer?
Read moreThe cybersecurity market is red-hot. But with so many still-unfilled positions, companies may be more willing to bend or break some hiring rules.
Read moreGlobal BEC Crackdown Nets 65 Suspects
March 31 2022FBI and international law enforcement agencies execute "Operation Eagle Sweep."
Read moreThe Academic Engagement Network is designed to advance cybersecurity in four areas.
Read moreWhoever came up with the name "Spring4Shell" didn't help at all... we cut through the Spring Bug confusion
Read moreTake a preventative threat approach and apply security measures near end users, applications, and data to increase protection.
Read moreLatest episode - listen now!
Read moreNation-State Hackers Ramp Up Ukraine War-Themed Attacks
March 31 2022Among them is the operator of the Ghostwriter misinformation campaign, with a new browser-in-browser phishing technique, according to Google's research team.
Read moreChrome Zero-Day from North Korea
March 31 2022North Korean hackers have been exploiting a zero-day in Chrome.
The flaw, tracked as CVE-2022-0609, was exploited by two separate North Korean hacking groups. Both groups deployed the same...
Read more
Recent Comments