Leading browser vendors are putting the finishing touches to a set of APIs that make it easier for developers to protect their web applications against cross-site scripting (XSS)...
Microsoft has asked system administrators to patch PowerShell 7 against two vulnerabilities allowing attackers to bypass Windows Defender Application Control (WDAC) enforcements and gain access to...
Researchers have proven it’s possible to train a special-purpose deep-learning algorithm that can guess 4-digit card PINs 41% of the time, even if the victim is covering...
The NSA published an advisory regarding the use of wildcard TLS certificates, which can be escalated to carry out the Application Layer Protocol Content Confusion Attack...
Cyble Research Labs discovered an Android-based phishing campaign targeting customers of telecommunication services based in Japan. What happened? According to the research, attackers created multiple domains to...
A detailed report about FIN12, a financially motivated threat actor known for its ransomware activities, was recently released. The suspected partner of the TrickBot gang has...
The department is tracking a huge increase in ransomware disclosures but data suggests the events are still grossly underreported. The Treasury Department’s Financial Crimes Enforcement Network...
The Defense Digital Service’s automated investigations tool turns to the dark side of insider threat hunting and gets rebranded to match. An automated background investigations prototype...
The Cybersecurity and Infrastructure Security Agency and other agencies issued a joint advisory about mitigating ransomware threats. Four federal agencies have issued a joint advisory warning...
CISA, the Federal Bureau of Investigation (FBI), the Environmental Protection Agency (EPA), and the National Security Agency (NSA) have released a joint Cybersecurity Advisory (CSA) that details ongoing...
Recent Comments