The cops say they've recovered 80% of a $72 million cryptocoin heist... but the recovered funds alone are now worth over $4 billion!
Read moreResearchers have calculated the quantum computer size necessary to break 256-bit elliptic curve public-key cryptography:
Finally, we calculate the number of physical qubits required to break the 256-bit elliptic...
Read more
Mitigate Ransomware Risks With Modern Log Management
February 9 2022Enterprises using a modern log management platform have key tools in place to detect and mitigate some of the risks from a ransomware attack.
Read moreMitigate Ransomware Risks With Modern Log Management
February 9 2022Enterprises using a modern log management platform have key tools in place to detect and mitigate some of the risks from a ransomware attack.
Read moreMicrosoft Issues 51 CVEs for Patch Tuesday, None ‘Critical’
February 8 2022One publicly known flaw — an elevation-of-privilege bug in Windows Kernel — was included in the patches.
Read moreMicrosoft Patch Tuesday, February 2022 Edition
February 8 2022Microsoft today released software updates to plug security holes in its Windows operating systems and related software. This month's relatively light patch batch is refreshingly bereft of any zero-day...
Read moreGoogle Cuts User Account Compromises in Half With Simple Change
February 8 2022The online tech giant auto-enabled two-step verification for more than 150 million users, throwing up steep hurdles against scammers and attackers.
Read moreGet Started on Continuous Compliance Ahead of PCI DSS v4.0
February 8 2022Here's what vendors can do to prepare in the time remaining before the final release of PCI DSS 4.0 this quarter.
Read moreRecent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of...
Read moreCompanies are scanning more applications for vulnerabilities — and more often.
Read more
Recent Comments