The Dark Side of Browser Isolation – and the Next Generation Browser Security Technologies
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the…
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the…
Cybersecurity agencies from Japan and the U.S. have warned of attacks mounted by a state-backed hacking group from China to…
A new deceptive campaign has been observed hijacking GitHub accounts and committing malicious code disguised as Dependabot contributions with an…
Cisco is warning of attempted exploitation of a security flaw in its IOS Software and IOS XE Software that could…
Progress Software has released hotfixes for a critical security vulnerability, alongside seven other flaws, in the WS_FTP Server Ad hoc…
Google has assigned a new CVE identifier for a critical security flaw in the libwebp image library for rendering images…
A new malware strain called ZenRAT has emerged in the wild that's distributed via bogus installation packages of the Bitwarden…
Data security is in the headlines often, and it’s almost never for a positive reason. Major breaches, new ways to…
A novel side-channel attack called GPU.zip renders virtually all modern graphics processing units (GPU) vulnerable to information leakage. "This channel…
A new threat actor known as AtlasCross has been observed leveraging Red Cross-themed phishing lures to deliver two previously undocumented…