Looking Back at 25 Years of Black Hat
The Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has made…
The Black Hat USA conference's silver jubilee is an opportunity to remember its defining moments, the impact it has made…
A new large-scale phishing campaign targeting credentials for Microsoft email services use a custom proxy-based phishing kit to bypass multi-factor…
In the wrong hands, the changes could enable state-sponsored internet surveillance says Mozilla's Chief Security Officer
Advancing Risk Management and Stemming the River of Risk by Adopting the Consistent Taxonomy of Cybersecurity Threats – […] The…
A newly discovered lightweight and persistent malware was used by attackers to backdoor Microsoft Exchange servers belonging to government and…
A Chinese-speaking threat actor has hacked into the building automation systems (used to control HVAC, fire, and security functions) of…
In addition, Aqua Security unveiled a new open source tool, Chain-Bench, for auditing the software supply chain to ensure compliance…
By Shigraf Aijaz, Cybersecurity Journalist and Writer, Be Encrypted The popularity of online streaming has grown significantly in […] The…
Google last week reported seven vulnerabilities in the browser, four of which it rated as high severity.
By Brian Platz, CEO and co-founder, Fluree A target-rich environment While news of cyber attacks emanating from Russia’s […] The…