Zephyrnet Logo

Tag: blackhat

Four Rules and Three Tools to Protect Against Fake SaaS Apps

Here's how to blunt the twinned forces of shadow IT and counterfeit apps and keep your data safe. When employees work in an...

Ripple20: More Vulnerable Devices Identified

Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.Back in June, researchers with security firm JSOF disclosed...

3 Tips For Better Security Across the Software Supply Chain

It may sound look intimidating, but with a few tweaks to tools and processes already in use, it's not hard to get a...

What a Security Engineer & Software Engineer Learned by Swapping Roles

A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.Security...

Tales from the Trenches Show Security Issues Endemic to Healthcare

The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security...

3 Tips for Securing Open Source Software

Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate. Open source...

Microsoft Teams Vulnerable to Patch Workaround, Researchers Report

Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.Security researchers have discovered a way to...

Microsoft Paid $13.7M in Bug Bounty Rewards in 2019-2020

The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.Over the past 12 months, Microsoft...

Why Confidential Computing Is a Game Changer

Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.When...

DDoS Attacks Doubled in Q2 Compared with Prior Quarter

Most attacks were small, but the big ones got bigger than ever, Cloudflare says.The number of network layer–distributed denial-of-service (DDoS) attacks — like...

wolfSSL Compiles Most Comprehensive Set of Cryptographic Benchmarks

EDMONDS, Wash. (PRWEB) August 05, 2020 The wolfSSL embedded SSL/TLS library was written from the ground-up with portability, performance, and...

How Ransomware Threats Are Evolving & How to Spot Them

A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.Modern ransomware operators are adopting...

Latest Intelligence

spot_img
spot_img