Friday Squid Blogging: Squid Dog Toy
August 6 2021It’s sold out, but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Read moreIt’s sold out, but the pictures are cute. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read...
Read moreNew research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security.
Read moreOnce more unto the breach, dear friends, once more...
Read more
Fascinating research: “Generating Master Faces for Dictionary Attacks with a Network-Assisted Latent Space Evolution.”
Abstract: A master face is a face image that passes face-based identity-authentication for a large...
Read more
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
Read more"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today.
Read moreMandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
Read moreAhhhh, the irony! Red-team network attack tool has its very own bug for Blue Teams to counterexploit.
Read moreAttacks require executing code on a system but foil Apple's approach to protecting private data and systems files.
Read moreResearchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem.
Read more
Recent Comments