A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defenses to retrieve sensitive information using a Spectre-style attack. Dubbed Spook.js,...
Chris Inglis is still trying to distinguish his role and responsibilities from other leading cyber officials. By the fall of 2022, National Cyber Director Chris Inglis...
A new filing updates the department’s policies on who can access IT systems and data, as well as the fines and prison terms for unauthorized access...
The Open Web Application Security Project (OWASP) has published its draft Top 10 2021 list revealing a shake-up of how modern threats are categorized. In an...
The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment...
A critical security vulnerability has been disclosed in HAProxy that could be abused by an adversary to possibly smuggle HTTP requests, resulting in unauthorized access to...
As we approach the 18-month mark of operating in a pandemic environment, it has become quite clear that the key to securing networks with a remote...
New details have emerged about the recent Windows CVE-2021-40444 zero-day vulnerability, how it is being exploited in attacks, and the threat actor’s ultimate goal of taking...
John Hammond, security researcher with Huntress, discusses how financially motivated cybercrooks use and abuse cryptocurrency. This is part one of a two-part series on how hackers...
Thoma Bravo announced it has signed a definitive agreement to make a strategic growth investment in Intel 471, a provider of cyber threat intelligence for leading enterprises and...