The Client/Server Relationship — A Match Made In Heaven
This blog post was co-authored with Charlie Clark and Andrew Schwartz from TrustedSec 1 Introduction One thing often forgotten is…
This blog post was co-authored with Charlie Clark and Andrew Schwartz from TrustedSec 1 Introduction One thing often forgotten is…
Researchers are trying to use AI to detect “social norms violations.” Feels a little sketchy right now, but this is…
In a notable comeback, the creators of the notorious Raccoon Stealer information-stealing malware have reemerged after a six-month hiatus. This…
Cleaning products manufacturer Clorox Company announced that it has taken some systems offline in response to a cyberattack. The Clorox…
US CISA added critical vulnerability CVE-2023-24489 in Citrix ShareFile to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure Security…
Infosecurity learning modules will cover security planning, policy, and leadership.
The group continues to target SQL servers, adding the Remcos RAT, BatCloak, and Metasploit in an attack that shows advance…
Last week, the department uncovered a data breach that occurred back in June stemming from what it deems to be…
A phishing campaign employing QR codes targeted a leading energy company in the US, cybersecurity firm Cofense reported. Starting from…
Apps on your iPhone must come from the App Store. Except when they don't... we explain what to look out…