Verizon DBIR: Enterprises Know the Pain of Zero Day Exploits All Too Well
The Verizon 2024 Data Breach Investigations Report shows a 180 percent increase in the use of vulnerability exploits in breaches
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
The Verizon 2024 Data Breach Investigations Report shows a 180 percent increase in the use of vulnerability exploits in breaches
Cactus ransomware actors are targeting Qlik Sense servers with exploits for three separate vulnerabilities in an ongoing campaign.
A Russian threat group known as Forest Blizzard has been using a custom tool called GooseEgg to exploit a Windows Print Spooler
The FBI and NSA desire to weaken encryption is still the same, despite change at the top of the agencies.
Some connected cars will download and permanently store data from phones that sync to them.
The Uber Metta adversarial simulation tool allows defenders to test their network detection systems.
In 1999 a group of venture capitalists came together to buy the L0pht and make it part of @stake, a security consulting firm.
Malicious app developers are using anti-reverse engineering tactics to get around Google Play security restrictions.