#DEFCON: How Sanctions Impact Internet Operators
Following government sanctions against Russia, Internet providers have had to learn how to implement actions Read More
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
Jen Easterly discusses the progress and challenges at CISA Read More
Three Extradited from UK to US on $5m BEC Charges
Nigerian nationals accused of targeting US universities Read More
Everything you need to know about the new features in VSS & MVP
This blog was written by an independent guest blogger. Since AT&T launched its Vulnerability Scanning Service (VSS) in 2012, in partnership with DDI/HelpSystems, over 30...
New Study Reveals Serious Cyber Insurance Shortfalls
Most companies do not have enough coverage to recover from ransomware Read More
Top 5 security risks of Open RAN
When a cell phone or other mobile device connects to the nearest cell tower, the communication takes place over something called a RAN -- a...
3 ways China’s access to TikTok data is a security risk
The short-video platform TikTok has come under fire in recent months. Both lawmakers and citizens in the U.S. have questioned its data collection practices and...
Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
Researchers find many deployments have authentication disabled Read More
ZDI-22-1067: NetBSD Kernel stat System Call Uninitialized Memory Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of NetBSD Kernel. An attacker must first obtain the ability to execute low-privileged...
ZDI-22-1065: Apple macOS Remote Events Memory Corruption Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Authentication is not required to exploit this vulnerability. Read More