Understanding the Human Communications Attack Surface
Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.
Companies should recognize that collaboration platforms aren't isolated, secure channels where traditional threats don't exist.
Virtually all compilers -- programs that transform human-readable source code into computer-executable machine code -- are vulnerable to an insidious…
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored…
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different […] The…
Google has released Chrome 95.0.4638.69 for Windows, Mac, and Linux to fix two zero-day vulnerabilities that attackers have actively exploited.…
New Android malware can root infected devices to take complete control and silently tweak system settings, as well as evade detection using…
Russia-linked Nobelium APT group has breached at least 14 managed service providers (MSPs) and cloud service providers since May […] The…
An analysis of 500 hacking incidents across a wide range of industries has revealed trends that characterize a maturity in…
In a short tweet today, exploit broker Zerodium said that it is looking to acquire zero-day exploits for vulnerabilities in…
By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, […] The…