There are two main types of malware analysis: static and dynamic. Performing static analysis of a malicious binary means concentrating on analyizing its code without executing...
https://player.vimeo.com/video/740300671?h=eb7e5bc4cb&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In this Help Net Security video, James E. Lee, Chief Operating Officer of the Identity Theft Resource Center, discusses the 2021 Trends in Identity Report, which...
Postman released the results of its 2022 State of the API Report, which surveyed more than 37,000 developers and API professionals on a range of topics, including their...
Radware released a report revealing that the number of malicious DDoS attacks climbed by 203% compared to the first six months of 2021. The report also underscores how...
A security firm has criticized CrowdStrike for operating a “ridiculous” bug bounty disclosure program following a sensor flaw report. In April, Pascal Zenker, a partner of...
GitLab has issued a security update to address a critical vulnerability that could lead to remote code execution (RCE). The vulnerability could allow an authenticated user...
The Department of Energy’s investment will help to fund 15 research projects to protect critical energy infrastructure. Following several attacks on critical infrastructure in recent years...
State and local officials, along with representatives from federal agencies and election industry companies, participated in the “Tabletop the Vote” exercise to prepare for a range...
Greece’s largest natural gas distributor DESFA confirmed on Saturday that they suffered a limited scope data breach and IT system outage following a cyberattack. In a public statement shared with...
The LockBit ransomware operation’s data leak sites have been shut down over the weekend due to a DDoS attack telling them to remove Entrust’s allegedly stolen...