Java Crypto Bug Allows Forging of Signatures, Certificates
A critical bug in Java's implementation of ECDSA (CVE-2022-21449) can allow an attacker to forge a signature or certificate to...
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
A critical bug in Java's implementation of ECDSA (CVE-2022-21449) can allow an attacker to forge a signature or certificate to...
The U.S. government and military is looking to attract and retain more talented cyber operators to keep pace with the evolving...
The U.S. has indicted four Russians it alleges are affiliated with the FSB and GRU units responsible for the Triton and...
The Uber Metta adversarial simulation tool allows defenders to test their network detection systems.
In 1999 a group of venture capitalists came together to buy the L0pht and make it part of @stake, a security consulting firm.
Malicious app developers are using anti-reverse engineering tactics to get around Google Play security restrictions.
The L0pht hacker group testified before the Senate in 1998 and told the lawmakers they could take down the Internet in 30 minutes or less because of a vulnerability in the BGP protocol.
Cryptocurrency crime is expanding beyond ransomware to in-browser mining and nation-state attacks.