Find video interviews with some of the coolest Black Hat Asia experts right here, as part of the Dark Reading News Desk this week.
Read moreThe ubiquity of Microsoft Office document formats means attackers will continue to use them to spread malware and infect systems.
Read moreProfessionals in each field describe a poor working relationship between the two teams
Read moreThe Department of Defense expands its vulnerability disclosure program to include a broad range of new targets.
Read moreSeparate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the...
Read moreThe FBI's action to remove Web shells from compromised Microsoft Exchange Servers sparks a broader discussion about officials' response to cyberattacks.
Read moreNew Spectre-Like Attacks
May 5 2021
There’s new research that demonstrates security vulnerabilities in all of the AMD and Intel chips with micro-op caches, including the ones that were specifically engineered to be resistant...
Read moreWe might be leaving the world of mandatory asterisks and interrobangs behind for good.
Read moreThese bugs date back to 2009, and they could give crooks who are already in your network access to sysadmin superpowers.
Read morePhishers targeting Microsoft Office 365 users increasingly are turning to specialized links that take users to their organization's own email login page. After a user logs in, the link...
Read more
Recent Comments