#BHEU: Time for Cyber Pros to Shape the Industry’s Future
Jen Ellis urges the cyber industry to take a leading role in shaping its future, during Black Hat Europe 2022
Cyber News, Cyber Threat TrendsJen Ellis urges the cyber industry to take a leading role in shaping its future, during Black Hat Europe 2022
Cyber News, Cyber Threat TrendsA bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. […]
Cyber News, Cyber Threat TrendsWatch ThreatWise TV: Explorations in the spam folder The spam folder: that dark and disregarded corner of every email account, full of too-good-to-be-true offers, unexpected shipments, and supposedly free giveaways. You’re right to ignore this folder; few good things come from exploring it. But every once in a while one of these misleading, and sometimes […]
Cyber News, Cyber Threat TrendsA bunch of Android OEM signing keys have been leaked or stolen, and they are actively being used to sign malware. Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. […]
Cyber News, Cyber Threat TrendsWhat is CRQC? Widespread interest in quantum computing continues to expand as computer innovators, scientists, and technology industry leaders vie to position themselves at the top of the pack for quantum computing prowess. As the buzz continues, I’d like to discuss Cryptographically Relevant Quantum Computers (CRQC) in simple terms. A CRQC uses quantum mechanical phenomena […]
Cyber News, Cyber Threat TrendsPolice studied photos sent via EncroChat to reveal users
Cyber News, Cyber Threat TrendsPolice studied photos sent via EncroChat to reveal users
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat TrendsApple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple ID.
Cyber News, Cyber Threat Trends