
Memory-safe malware: Rust challenges security researchers
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Kernels, drivers, and other critical components of IT systems are being rewritten en masse in Rust. This prog...
Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Paramount has fallen victim to a hack. Hackers gained access to personal data as a result. American enter...
Google is increasingly cracking down on rogue apps posing as legitimate apps in its Play store. Recently, at ...
VMware is warning of two SSH authentication vulnerabilities in Aria Operations for Networks. These can allow ...
Previously, as a red-teamer, I was assigned to break into a clients network with the goal to steal pre-define...
Hackers can accurately determine your location with the new malware Whiffy Recon. The data can potentially be...
North Korean hackers from Lazarus have launched two new sophisticated attacks. Their methods rely on open-sou...
From the initial investigation into the cyber attack at Econocom, the IT services provider concludes that onl...
Microsoft will soon enable Windows Extended Protection by default in Exchange Server 2019 with a cumulative u...
Honeywell has acquired Israel-based SCADAfence. Its OT and IoT security technology will be integrated into Ho...
Cybercriminals have become increasingly sophisticated, complete with Ransomware-as-a-Service models and covet...