Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link.
Read moreMandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being available and deploying sophisticated malware previously ...
Read moreMandiant has observed an aggressive financially motivated group, UNC2447, exploiting one SonicWall VPN zero-day vulnerability prior to a patch being available and deploying sophisticated malware previously ...
Read moreAPI Hole on Experian Partner Site Exposes Credit Scores
April 29 2021Student researcher is concerned security gap may exist on many other sites.
Read moreAPI Hole on Experian Partner Site Exposes Credit Scores
April 29 2021Student researcher is concerned security gap may exist on many other sites.
Read moreMore than 25 critical memory allocation bugs could enable attackers to bypass security controls in industrial, medical, and enterprise devices.
Read moreYour Digital Identity’s Evil Shadow
April 29 2021In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.
Read moreThe Challenge of Securing Non-People Identities
April 29 2021Non-people identities, which can act intelligently and make decisions on behalf of a person's identity, are a growing cybersecurity risk.
Read moreTask Force Seeks to Disrupt Ransomware Payments
April 29 2021Some of the world's top tech firms are backing a new industry task force focused on disrupting cybercriminal ransomware gangs by limiting their ability to get paid, and targeting...
Read moreListen now - latest episode - lots of fun but with a serious (and educational!) side.
Read more
Recent Comments