A team of researchers has developed a new open-source tool that can help automate the discovery of dangerous deserialization vulnerabilities in .Net applications. Named SerialDetector, the...
Claims by a respected German mathematician that the widely used RSA algorithm has been cracked by an advance in cryptoanalysis have received a respectful but cautious response. One-way...
A security vulnerability has been discovered in CIRA’s Canadian Shield iOS application – an app designed to protect Canadian users from malware and phishing. Canadian Shield, created by...
Under pressure to support a newly distributed workforce, organizations are rapidly migrating to the cloud. While this may be viewed as a leap forward for business, it...
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to...
There has been a misconception about privacy that confuses many people. People tend to share seemingly related or unrelated personal information online, such as birthdays, address,...
Comments on draft documents required under the IoT Cybersecurity Improvement Act raise concerns of both fragmentation and a lack of flexibility. Time is up for the...
The National Security Agency and Cybersecurity and Infrastructure Security Agency (CISA) released a cybersecurity information sheet, “Selecting a Protective DNS Service.” This publication details the benefits...
Technologists look for environments that value them, give them challenging opportunities, help them grow their skills, and provide a path to advance their careers. Already, the...
ModSecurity 3 web application firewall (WAF) installations configured to disable Request Body Access can be bypassed, security researchers warn. The purported issue in ModSecurity rule sets is...