Researchers share a list of passwords that Purple Fox attackers commonly brute force when targeting the SMB protocol.
Read moreLazarus Group Uses New Tactic to Evade Detection
April 19 2021Attackers conceal malicious code within a BMP file to slip past security tools designed to detect embedded objects within images.
Read moreCybersecurity is more than technology or safeguards like zero trust; mostly, it's about collaboration.
Read moreNaked Security Live – To hack or not to hack?
April 19 2021Latest video - watch now! We look at the recent FBI "webshell hacking" controversy from both sides.
Read moreSimply put: reading from RAM in your program could write to RAM in someone else's
Read more
The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company...
Read morePandemic Drives Greater Need for Endpoint Security
April 16 2021Endpoint security has changed. Can your security plan keep up?
Read moreDivers find three-foot “blobs” — egg sacs of the squid Illex coindetii — off the coast of Norway. As usual, you can also use this squid post to talk about...
Read moreFedir Hladyr pleaded guilty in 2019 to conspiracy to commit wire fraud and conspiracy to commit computer hacking.
Read moreResearchers spot problems in how IoT vendors delegate device access across multiple clouds and users.
Read more
Recent Comments