Dark
What Is the Difference Between Security and Resilience?New!!

Resilience shifts the focus toward eliminating the probable impact of the full attack chain....

Read more
Dark
Binary Check Ad Blocker Security News
Consumers Share Security Fears as Risky Behaviors PersistNew!!

While most US adults know they aren't sufficiently protecting their data online, many find security time-consuming or don't know the steps they should take....

Read more
Dark
TangleBot Campaign Underscores SMS ThreatNew!!

The attack targets Android devices and starts with a malicious SMS message that aims to bring malware onto compromised devices....

Read more
Dark
UK MoD Data Breach Shows Cybersecurity Must Protect Both People and DataNew!!

The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences. ...

Read more
Dark
FragAttacks Foil 2 Decades of Wireless Security

Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks. ...

Read more
Dark
Researchers Call for 'CVE' Approach for Cloud Vulnerabilities

New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security. ...

Read more
Dark
HTTP/2 Implementation Errors Exposing Websites to Serious Risks

Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA. ...

Read more
Dark
CISA Launches JCDC, the Joint Cyber Defense Collaborative

"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today. ...

Read more
Dark
Incident Responders Explore Microsoft 365 Attacks in the Wild

Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access. ...

Read more
Dark
Researchers Find Significant Vulnerabilities in macOS Privacy Protections

Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files. ...

Read more