Eugene Kaspersky’s Statement Provokes Controversy Within Cybersecurity Industry
Eugene Kaspersky's statement on ongoing conflict in Ukraine provoked strong reaction from leading cybersecurity figures Read More
USN-5310-1: GNU C Library vulnerabilities
Jan Engelhardt, Tavis Ormandy, and others discovered that the GNU C Library iconv feature incorrectly handled certain input sequences. An attacker could possibly use this...
kicad-6.0.2-1.fc35
FEDORA-2022-78b18981a6 Packages in this update: kicad-6.0.2-1.fc35 Update description: Update to 6.0.2 Read More
Analyzing Cyber and Influence Operations in the Russia-Ukraine Conflict
The Russian invasion of Ukraine represents a new type of warfare, including extensive cyber and information operations Read More
Rash of hacktivism incidents accompany Russia’s invasion of Ukraine
In keeping with the hybrid nature of Russia’s invasion of Ukraine, several hacktivist groups and hackers have joined the fight in the embattled nation, including...
Decrypting Hive Ransomware Data
Nice piece of research: Abstract: Among the many types of malicious codes, ransomware poses a major threat. Ransomware encrypts data and demands a ransom in...
Why client-side web application security is critical to protecting from Magecart and other similar attacks
What can’t you buy on the internet? Last-minute birthday gifts. Check. A new refrigerator. Check. An engagement ring. Check. Groceries. Check. Travel to foreign lands....
7 mistakes CISOs make when presenting to the board
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. This gives security leaders an opportunity to help senior business stakeholders...
12 risk-based authentication tools compared
Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. As phishing and...
Conti Encrypts Karma Ransom Note in Same Victim Network
Two groups attacked same healthcare organization Read More