Dark Reading Video News Desk Comes to Black Hat Europe
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices…
While attendees join Black Hat Europe 2021 virtually and live in London, we bring you prerecorded interviews from remote offices…
Microsoft warned admins today to immediately patch a high severity Exchange Server vulnerability that may allow authenticated attackers to execute code…
The Australian Cyber Security Center (ACSC) is alerting web admins of the active exploitation of CVE-2021-42237, a remote code execution…
Law enforcement continues to keep up the pressure on ransomware operations with infrastructure hacks and million-dollar rewards, leading to the…
A security tool that monitors OT devices can't disrupt operations. This is why the Self-Learning AI acts only on information…
Researchers have released public exploit code and a proof of concept tool to test Bluetooth devices against System-on-a-Chip (SoC) security…
A new threat actor is hacking Microsoft Exchange servers and breaching corporate networks using the ProxyShell vulnerability to deploy the Babuk…
Contestants hacked the Samsung Galaxy S21 smartphone during the second day of the Pwn2Own Austin 2021 competition, as well as routers, NAS…
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of […] The…
Organizations should start to evaluate other security measures to replace or complement the once-venerable security sandbox.