Internet usage in 2020 is shaping up to be very different from how it was at the end of 2019. New DNS research from Farsight Security shows where people have been spending their time online and uncovered previously unknown distributed denial of service attacks.
OpenSSH will soon deprecate the use of SHA-1 because of the risk of specific attacks against the algorithm.
Compromised credentials and empty SSH passphrases led to the string of attacks on academic supercomputing sites in recent weeks.
Two years may have passed since enforcement of the European Union’s General Data Protection Regulation began, but regulators are just wrapping up the first wave of investigations. Change comes slowly in the realm of data privacy, and it is still too soon to try to improve the regulation.
Authorities in Ukraine arrested a suspect they say is Sanix, a hacker connected to the sale of the huge Collection 1 credential database.
Modern software development relies on open source libraries, even for those applications that are sold commercially and aren’t open source. A pair of reports from Veracode and Synopsys illustrate how these components are introducing vulnerabilities into these applications.
Ping Look, senior director of Microsoft's Detection and Response Team, joins Dennis Fisher to talk about her team's work helping enterprises recover from intrusions, the spike in ransomware infections, and understanding attacker behavior.
Chrome 83 introduces default support for DNS over HTTPS to protects users' DNS queries from surveillance.
In the 13th Data Breach Investigations Report, Verizon researchers found that attackers are relying less on malware and more on stolen or lost credentials to carry out their attacks.
The attacks that hit numerous academic supercomputing sites have kept the powerful clusters offline for a week.
A series of possibly related incidents has forced supercomputing site ARCHER in the UK and several others in Germany offline in the past few days.
Microsoft's February security update fixes the vulnerability that can result in reverse RDP attacks in the built-in Windows RDP client, but third-party RDP clients are still vulnerable, Check Point said.
A vulnerability in the Windows print spooler service patched this week echoes a similar one exploited by the Stuxnet worm 10 years ago.
A bipartisan group of Congressional lawmakers are trying to drum up support to include money for states and local governments to modernize their IT infrastructure in the next stimulus package.
The U.S. government has published details of three new malware tools it says are in use by North Korean state-sponsored attackers.