The task force currently running these efforts is set to dissolve in the coming months. A Defense Department task force is making progress on developing procedures...
ANALYSIS Cybersecurity issues – not least allegations that Russian interference brought him to power – loomed large over the presidency of Donald Trump. With cyber-attacks against the US public...
The “second age” of quantum computing is poised to bring a wealth of new opportunities to the cybersecurity industry – but in order to take full...
Attackers can bypass CoTURN servers’ default access control rules and access network services behind the firewall, security researchers have discovered. One researcher speculated that, under certain circumstances, an...
Microsoft has addressed companies who have not yet updated their systems to address the critical Zerologon flaw, a vulnerability in the cryptography of Microsoft’s Netlogon process that allows...
The National Security Agency (NSA) has released an information sheet with guidance on adopting encrypted Domain Name System (DNS) over Hypertext Transfer Protocol over Transport Layer...
It’s rare for the top-level domains of countries to fall into the hands of individuals, but in some cases it is the only way to stop...
Fredrik Almroth thought the authorities would try to save the critical domain name. Nobody ever did. In mid-October, a little-known but critically important domain name for one...
TA551 (aka Shathak) is an email-based malware distribution campaign that is actively targeting English-speaking victims. Active since early 2020, TA551 is known to distribute multiple malware...
Since its emergence, xHunt campaign threat actors have been continuously attacking Kuwaiti organizations, mostly by targeting Microsoft Exchange servers. What’s new in the report? Recently, Palo...
Recent Comments