Initiative Aims to Encourage Diverse Talent into Cyber
National Cybersecurity Alliance launches HBCU career program Read More
Ukrainian Police Bust Crypto Fraud Call Centers
Scammers spoofed legitimate banks’ phone numbers Read More
Women in cybersecurity form non-profit organization The Forte Group
A group of over 90 women working in cybersecurity roles have formed The Forte Group, a non-profit organization for the education and advocacy of women...
Resolving conflicts between security best practices and compliance mandates
So, you read a great tip on the internet and think it would improve your security posture. Before you bring that tip to management, it’s...
Stuxnet explained: The first known cyberweapon
What is Stuxnet? Stuxnet is a powerful computer worm designed by U.S. and Israeli intelligence that to disable a key part of the Iranian nuclear...
ICO Pursues Traffic Accident Data Thieves
Data protection regulator begins criminal proceedings Read More
ZDI-22-1178: Trend Micro HouseCall Incorrect Permission Assignment Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro HouseCall. An attacker must first obtain the ability to execute low-privileged...
ZDI-22-1175: Trend Micro Maximum Security Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute...
ZDI-22-1176: Trend Micro Maximum Security Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to...
ZDI-22-1177: Trend Micro Maximum Security Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to...