New Windows Driver Signature bypass allows kernel rootkit installs
Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits on fully…
Attackers can downgrade Windows kernel components to bypass security features such as Driver Signature Enforcement and deploy rootkits on fully…
Adversaries can exploit CVE-2024-6769 to jump from regular to admin access without triggering UAC, but Microsoft says it's not really…
The importance of internet safety has never been more pronounced than in today’s digital age, where the boundaries between our…
In this case study, a 180-year-old life and pension insurer brought its security infrastructure into the modern age.
The modern American political landscape shows a perplexing imbalance. The 21st-century progressive movement has a mainstream core that secures most…
Revolutionizing Network Security Automation I recently spoke with Rekha Shenoy, CEO of BackBox during the BlackHat conference, and her insights…
ThreatLocker has created a list of the top 15 actions to secure an organization if employing a remote or hybrid…
I was thrilled to catch up with Bedrock Security during Black Hat USA 2024. The surge in data volume from…
Justice Department submits court filing this week certifying that former President Trump acted within the scope of his office when…
Inconsistencies and lack of information in cybersecurity disclosures highlight the need for organizations to establish a robust materiality assessment framework.