#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
The CSRB concluded that the initial disclosure on Log4j was done right, but there is still much to improve
More results...
The CSRB concluded that the initial disclosure on Log4j was done right, but there is still much to improve
Tim Vereecke, technical solutions architect at Akamai, discusses how he uses a developer-first mindset to find internet performance solutions.
Networking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.
According to researchers, Russia is rolling out a growing list of wiper attacks against Ukraine
New open source project set to reduce operational pain for SecOps analysts
Former US CISA Director Chris Krebs opens Black Hat USA detailing the state of cybersecurity today
Accenture warns that stolen data is flooding the cybercrime underground
Interpol warns of growing role of money mules
The campaign is not only ongoing, the threat actors increased its efforts to compromise targets using VileRAT
The report shows an 11% rise in archive files containing malware, including LNK files