The Future of AppSec Liability is Obvious
Photo by Bill Hornstein When you’re inside of a mess it’s sometimes difficult to see it for what it is. And this is the case…
Photo by Bill Hornstein When you’re inside of a mess it’s sometimes difficult to see it for what it is. And this is the case…
A federal judge last week placed strict limits on the kind of evidence NSO Group can raise during a trial on damages in the lawsuit…
Web-based attacks remain one of the most persistent threats to modern organizations, targeting everything from web applications and APIs to user email inboxes. Security Orchestration,…
The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest IBM X-Force report. This sharp…
Fake Booking.com emails trick hotel staff into running AsyncRAT malware via fake CAPTCHA, targeting systems with remote access trojan. A new phishing campaign is targeting…
November 12, 2012 I believe western civilization to be in the middle of a profound transition. The change I’m referring to is the move from…
In 2025, digital forensics stands at the intersection of rapid technological innovation, increasingly sophisticated cyber threats, and the ever-expanding volume of digital data. The role…
Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These attacks leverage the versatility of…
Apr 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky…
Japan’s Financial Services Agency (FSA) warned last week of the growing threat of hacked trading accounts that has resulted in nearly US $700 million in…
I’ve been thinking a lot about content for the book I’m working on, and given that the theme is speaking clearly and honestly about topics…
Dive Brief: Security researchers on Monday warned of a critical vulnerability in the Erlang Open Telecom Platform SSH implementation, which could allow an unauthenticated attacker…