US government officials weigh in on the attacks and malicious activity, which researchers believe may be the work of multiple groups.
Read moreTogether, the vendor giants aim to make "in use" encryption -- also known as "fully homomorphic encryption" -- economical and practical.
Read moreThe Edge Pro Tip: Proceed With Caution
March 8 2021Security pros offer up their post-SolarWinds patch-management advice.
Read moreA Basic Timeline of the Exchange Mass-Hack
March 8 2021Sometimes when a complex story takes us by surprise or knocks us back on our heels, it pays to revisit the events in a somewhat linear fashion. Here's a...
Read moreI see you/And what you do - So be aware/Before you share - And if in doubt/Don't give it out!
Read moreThe new administration is in an excellent position to make significant progress on data privacy -- not just because it's needed, but also because it's time.
Read moreHacking Digitally Signed PDF Files
March 8 2021
Interesting paper: “Shadow Attacks: Hiding and Replacing Content in Signed PDFs“:
Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee the authenticity and integrity of their...
Read more
Poison packages – “Supply Chain Risks” user hits Python community with 4000 fake modules
March 7 2021To this "researcher", even a job not worth doing was worth overdoing. Here's what you can learn from the incident...
Read moreFriday Squid Blogging: Vampire Squid Fossil
March 5 2021A 30-million-year-old vampire squid fossil was found, lost, and then re-found in Hungary. As usual, you can also use this squid post to talk about the security stories in the...
Read moreMandiant researchers identify a range of victims affected in attacks targeting newly reported Microsoft Exchange Server vulnerabilities.
Read more
Recent Comments