A critical security vulnerability impacting DrayTek Vigor routers could allow unauthenticated attackers to gain full access to victim networks. The flaw affects the Taiwanese hardware manufacturer’s...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’ attack, which...
Zyxel has released patches for several of its firewall products following the discovery of two security vulnerabilities that left business networks open to exploitation. First on...
Decentralized Identifiers (DID) is now an official web standard, according to a news release from the World Wide Web Consortium (W3C). DIDs are cryptographic digital identifiers not tied...
INTERVIEW Jon von Tetzchner has launched not one, but two web browser companies in his career. Today, he is CEO of Vivaldi Technologies, the business behind the Vivaldi browser, which...
ANALYSIS The first four standardized protocols for post-quantum cryptography have been unveiled, laying the foundations for the development of apps and web technologies that incorporate “future proof” encryption....
Malware protection specialist Emsisoft has released free decryption tools for the AstraLocker and Yashma ransomware variants. The decryptors were recently uploaded to the VirusTotal malware analysis...
Data monitoring and search vendor Splunk patched a code execution vulnerability in its Splunk Enterprise deployment server and is – belatedly, according to some – promising to back-port...
Citrix has patched a critical vulnerability in its Application Delivery Management (ADM) technology that, if left unresolved, creates a means for remote attackers to reset admin passwords. The...
Security engineers are proposing an experimental protocol that promises greater privacy in how DNS, the internet’s equivalent of a telephone directory, operates. Oblivious DNS-over-HTTPS (ODoH) describes a...
Recent Comments