Imagine if someone who didn't have your password could sneakily modify data that was encrypted with it.
Read moreThe Log4j vulnerability is only the latest security flaw to have global impact, prompting the Biden administration and software developers to pledge to produce more secure software.
Read moreWhat’s Next for Patch Management: Automation
January 14 2022The next five years will bring the widespread use of hyperautomation in patch management. Part 3 of 3.
Read moreREvil ransomware crew allegedly busted in Russia, says FSB
January 14 2022The Russian Federal Security Bureau has just published a report about the investigation and arrest of the infamous "REvil" ransomware crew.
Read moreREvil ransomware crew allegedly busted in Russia, says FSB
January 14 2022The Russian Federal Security Bureau has just published a report about the investigation and arrest of the infamous "REvil" ransomware crew.
Read moreUsing EM Waves to Detect Malware
January 14 2022I don’t even know what I think about this. Researchers have developed a malware detection system that uses EM waves: “Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware...
Read moreBlueNoroff Threat Group Targets Cryptocurrency Startups
January 13 2022A series of attacks against small and medium-sized businesses has led to major cryptocurrency losses for the victims.
Read moreBlueNoroff Threat Group Targets Cryptocurrency Startups
January 13 2022A series of attacks against small and medium-sized businesses has led to major cryptocurrency losses for the victims.
Read moreFighting Back Against Pegasus, Other Advanced Mobile Malware
January 13 2022Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
Read moreFighting Back Against Pegasus, Other Advanced Mobile Malware
January 13 2022Detecting infection traces from Pegasus and other APTs can be tricky, complicated by iOS and Android security features.
Read more
Recent Comments