Tag
#zero_day
Researcher to reveal fresh details at Black Hat Asia on a tenacious cyber-espionage group attacking specific military, law enforcement, aviation, and other entities in Central and South Asia.
A close look at a new type of network, known as a Cloud Area Network.
Attackers could use the flaw to steal credentials with no authentication required
All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023.
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data.
Unpatched flaw caused by the predictability of transaction IDs
Security must be precise enough to meet compliance requirements without impeding DevOps and developer productivity. Here's how to strike that balance.
A deep dive into securing containerized environments and understanding how they present unique security challenges.
QNAP and Synology say flaws in the Netatalk fileserver allow remote code execution and information disclosure.
International cybersecurity authorities have published an overview of the most routinely exploited vulnerabilities of 2021. The post The top 5 most routinely exploited vulnerabilities of 2021 appeared first on Malwarebytes Labs.