Beware the Bug Bounty
April 20 2021In recent months, bug-bounty programs have shifted from mitigating risk to inadvertently creating new liabilities for customers and vendors.
Read moreIn recent months, bug-bounty programs have shifted from mitigating risk to inadvertently creating new liabilities for customers and vendors.
Read moreLessons learned from the Unified Coordination Groups will be used to inform future response efforts, a government official says.
Read moreResearchers share a list of passwords that Purple Fox attackers commonly brute force when targeting the SMB protocol.
Read moreAttackers conceal malicious code within a BMP file to slip past security tools designed to detect embedded objects within images.
Read moreCybersecurity is more than technology or safeguards like zero trust; mostly, it's about collaboration.
Read moreLatest video - watch now! We look at the recent FBI "webshell hacking" controversy from both sides.
Read moreSimply put: reading from RAM in your program could write to RAM in someone else's
Read more
The Washington Post has published a long story on the unlocking of the San Bernardino Terrorist’s iPhone 5C in 2016. We all thought it was an Israeli company...
Read moreEndpoint security has changed. Can your security plan keep up?
Read more
Recent Comments