In this blog, see how an off-by-one error could lead to domain controller access in Microsoft Server Service.
Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
Meta Tests Encrypted Backups and End-to-End Encryption in Facebook Messenger
Meta is also introducing an encrypted backup feature called Secure Storage
Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
The devices were powered by MediaTek chips and susceptible to two kinds of attacks
SolidBit Ransomware Group Recruiting New Affiliates on Dark Web
20% of the earned profit from the distribution of the ransomware will be paid to the affiliates
Why Friday August 15th is a public holiday in Spain
Friday August 15th is a public holiday across every region of Spain. Find out why and how the country celebrates this day.
It?s Time to Protect Every SIM
Ensuring the security of billions of mobile devices is a priority. Learn how Akamai aims to protect and secure every SIM as we continually adapt to new threats.
#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
Katie Moussouris explains why simply having a bug bounty program isn’t enough to fix security problems
#BHUSA: Failure to Challenge is a Social Engineering Risk
The UK Ministry of Defence is actively training staff to confront individuals that are engaged in risky behaviours
#BHUSA: What has Changed in the Post-Stuxnet Era?
Investigative journalist Kim Zetter explains that Stuxnet continues to serves as a precedent for attacks happening now