Researchers suggest a few reasons why operators rewrote Buer in an entirely new language
Read moreA Northeastern University research team finds code defects -- and some vulnerabilities -- by detecting when programmers used different code snippets to perform the same functions.
Read moreIdentifying the Person Behind Bitcoin Fog
May 3 2021
The person behind the Bitcoin Fog was identified and arrested. Bitcoin Fog was an anonymization service: for a fee, it mixed a bunch of people’s bitcoins up so...
Read moreDark Reading Celebrates 15th Anniversary
May 3 2021Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
Read moreWill the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
Read moreThe Edge Pro Tip: Protect IoT Devices
May 3 2021As Internet-connected devices become more prevalent in organizations, security issues increase as well.
Read moreHere's the latest Naked Security talk - watch now!
Read moreFriday Squid Blogging: On Squid Coloration
April 30 2021Nice excerpt from Martin Wallin’s book Squid. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my...
Read moreAn 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.
Read moreUNC2447 observed targeting now-patched vulnerability in SonicWall VPN.
Read more
Recent Comments