What is a vulnerability?
Security basics: What is a vulnerability?
Security basics: What is a vulnerability?
Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) ⚡ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. ❗ If you find a USB stick somewhere: Do not plug it into…
What’s the state of your password security? Do you consider the length and complexity and don’t use the same password for multiple services? Post | LinkedIn
Maximilian Hedrich – Post | LinkedIn An example of what AI already is able to deliver today. We will need to deal with the issue of authenticity of voice and video in a AI driven future in a different way, than we did up to now. It’s not a question of “Will this technology be…
OT / IoT attacks and supply chain attacks are considered as 2 of the 10 most “hot trends” in cybersecurity 2022. 6 hot cybersecurity trends — and 2 going cold | CSO Online
😬 MITRE CVE list might go offline today! This would be catastrophic for global vulnerability management. What I’ve described as a scenario theoretically possible in How Trump 2.0 could affect the IT industry in Europe might become reality more quickly than I’ve thought and not on the NIST-NVD level, but on the MITRE level including…