Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.
Read moreCrowdStrike to Buy Zero-Trust SaaS Provider
November 1 2021SecureCircle provides data-level zero-trust control to endpoints.
Read more2021 will be the most costly and dangerous year on record.
Read moreA researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
Read moreName That Edge Toon: Parting Thoughts
November 1 2021Feeling creative? Come up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreHiding Vulnerabilities in Source Code
November 1 2021Really interesting research demonstrating how to hide vulnerabilities in source code by manipulating how Unicode text is displayed. It’s really clever, and not the sort of attack one...
Read moreUnderstanding the Human Communications Attack Surface
November 1 2021Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.
Read more‘Trojan Source’ Bug Threatens the Security of All Code
November 1 2021Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities...
Read more‘Trojan Source’ Bug Threatens the Security of All Code
November 1 2021Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities...
Read moreEnterprises Allocating More IT Dollars on Cybersecurity
October 29 2021Enterprises are allocating more IT dollars towards implementing a multilayered approach to securing data and applications against new threats, data shows.
Read more
Recent Comments