S3 Ep69: WordPress woes, Wormhole holes, and a Microsoft change of heart [Podcast + Transcript]
February 10 2022Latest episode - listen now!
Read moreLatest episode - listen now!
Read moreMicrosoft's release of relatively sparse vulnerability information makes it difficult for organizations to prioritize mitigation efforts, security experts say.
Read moreMicrosoft's release of relatively sparse vulnerability information makes it difficult for organizations to prioritize mitigation efforts, security experts say.
Read moreRansomware, cryptojacking, and a cracked version of the penetration-testing tool Cobalt Strike have increasingly targeted Linux in multicloud infrastructure, report states.
Read moreNew feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.
Read moreNew feature adds a dedicated security team and support for multiple languages to prevent fraudulent access with stolen credentials.
Read moreEnterprises are spending a pittance on securing their software supply chain, which makes COTS software dangerous — vulnerabilities can be "hidden" in open source components.
Read moreThe cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!
Read moreThe cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!
Read moreResearchers have calculated the quantum computer size necessary to break 256-bit elliptic curve public-key cryptography:
Finally, we calculate the number of physical qubits required to break the 256-bit elliptic...
Read more
Recent Comments