20K Ubiquiti IoT Cameras & Routers Are Sitting Ducks for Hackers
In the cloud, patches disseminate automatically. On your computer, you get notified. IoT devices, meanwhile, can escape attention for years…
Low-Drama ‘Dark Angels’ Reap Record Ransoms
A ransomware group called Dark Angels made headlines this past week when it was revealed the crime group recently received…
Name That Edge Toon: Pointing Fingers
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.…
China’s Evasive Panda Attacks ISP to Send Malicious Software Updates
The APT used DNS poisoning to install the Macma backdoor on targeted networks and then deliver malware to steal data…
Critical Apache OfBiz Vulnerability Allows Preauth RCE
The enterprise resource planning platform bug CVE-2024-38856 has a vulnerability-severity score of 9.8 out of 10 on the CVSS scale…
Startup Spotlight: LeakSignal Helps Plug Leaky Data in Organizations
Cybersecurity startup LeakSignal, a finalists in this year’s Black Hat USA Startup Spotlight competition, helps organizations see where data is…
Startup Spotlight: Knostic Tackles AI’s Oversharing Problem
Cybersecurity startup Knostic, a finalists in this year’s Black Hat USA Startup Spotlight competition, adds guardrails to how AI uses…
Protect Data Differently for a Different World
Adopting a military mindset toward cybersecurity means the industry moves beyond the current network protection strategies and toward a data-centric…