‘Zero Day Piled on Zero Day’
Edge devices have become the go-to targets for cybercriminals and state actors, and experts say that will continue for the
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
Edge devices have become the go-to targets for cybercriminals and state actors, and experts say that will continue for the
The Verizon 2024 Data Breach Investigations Report shows a 180 percent increase in the use of vulnerability exploits in breaches
Cactus ransomware actors are targeting Qlik Sense servers with exploits for three separate vulnerabilities in an ongoing campaign.
The OS X Gatekeeper security system can be bypassed with a new technique developed by researcher Filippo Cavallarin.
A vulnerability in all versions of the Docker platform can give an attacker full read and write access to the host file system.
Bills in the House and Senate would prevent warrantless searches of Americans' devices at the border.
The Do Not Track Act introduced by Sen. Josh Hawley would establish a single, enforceable mechanism for people to prevent data collection and online tracking.
Some Google G Suite customers' passwords were stored in plain text on the company's network since 2005.