Heat, Kelso and the Hacker Mindset
In the 1995 classic Heat, the character Kelso is an old-school hacker with a background as a DARPA scientist who uses his
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
In the 1995 classic Heat, the character Kelso is an old-school hacker with a background as a DARPA scientist who uses his
Europol and other agencies disrupted several major malware families, including IcedID, Bymblebess, Trickbot, and Smokeloader in an
Securing AI systems and LLMs seems like a daunting task, but experts say the same principles that apply to software security can
Many versions of the PuTTY client have a weakness that can generate biased ECDSA nonces and enable an attacker to eventually recover private encryption keys.
CISA is warning of a customer data breach at Sisense, a provider of business data analytics platforms, but the details of the incident are scarce still.
A newly identified threat group known as Starry Addax is targeting human rights activists and others in western Africa with novel Android malware called FlexStarling.
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are known, there is plenty we still don't know. Dennis Fisher and Lindsey O'Donnell-Welch talk about the unknowns and what if anything could have been done to prevent this from happening.
Ivanti has released patches for four new vulnerabilities in its Connect Secure and Policy Secure appliances, as Mandiant said it has seen eight separate groups exploiting some older flaws in those devices.