Content Paint

cybersecurity

Here's why Intel’s UEFI source code leak is a genuine security concern

Intel late Sunday confirmed that proprietary UEFI code had been leaked in a potential serious security breach. The Intel Alder Lake source code was leaked to 4chan and Github – as first reported by Tom’s Hardware – as a 6GB file containing sensitive tools and code for building and optimising BIOS/

Former Uber CSO Joe Sullivan found guilty of concealing data breach

Note: There is no contractual indemnity clause that will cover criminal activity.

US agencies ordered to run asset discovery scans every single week

Knock Knock. Who's there? Multiple APTs, patch your shit.

Critical Akamai bug could have let hackers poison millions of major brands' websites

Absence of a bug bounty programme led to a “race against time” for customer bug bounties...

Bolster your VMware ESXi security: Novel malware ecosystem identified

Malware avoids EDR, attains persistence, is highly stealthy

Two unpatched Microsoft Exchange Server zero days are under attack.

Exploited for a month. No detection in Sentinel, no patch yet. Mitigate urgently.

Major authentication provider Auth0 says code repositories were copied

Mystery around the data breach, but we can speculate...

Aussie Cyber Minister blasts telco's "sophisticated" hack claims: "No. It wasn't"

"They left the window open"

British gov't aims to kill off Companies House's Bobby Tables problem

The British government is changing Companies House name rules to prevent people from creating company names which include code that could sabotage unwary data processors through cross-site scripting (XSS) injection attacks. When a company is registered in the UK, it has to follow certain rules about its name – but provided

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.