3 Things We Still Don’t Know About the XZ Backdoor
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.
The XZ Utils backdoor was a very subtle operation that took several years to pull off, and while some of the technical details are
The Cyber Safety Review Board cited a string of internal failures in Microsoft's security culture as contributing factors for the
The U.S. has announced sanctions against a Chinese state-backed company and two individuals, as well as indictments against seven
Jonathan Mayer, assistant professor of computer science at Princeton University, joins Dennis Fisher to discuss the technical and legal challenges of Apple's announced CSAM scanning system.
A critical flaw in the ThroughTek Kalay Io platform could allow an attacker complete access to IP cameras, DVRs, and other devices.
GitHub has eliminated support for passwords for Git operations and now requires the use of a hardware security key or other strong 2FA option.
Several vulnerabilities in the Realtek SDK expose millions of IoT devices to remote code execution.
A newer ransomware group known as Vice Society is targeting the PrintNightmare vulnerabilities in some of its intrusions now.