Learning how to hack has a long feedback loop.

Hacking is a different discipline compared to other things that you learn because there is a long feedback loop. In a traditional educational setting, we are used to receiving specific…

2021 Mid-Year WordPress Security Report: A Collaboration Between Wordfence and WPScan

WordFence –  WordFence –  Wordfence has collaborated with WPScan to conduct a 2021 mid-year review on the state of WordPress security. Using attack data from Wordfence’s internal threat intelligence platform,…

How criminals have abused a Microsoft Exchange flaw in the wild

As noted by Keysight and others, Microsoft Exchange servers have a specific block architecture designed to handle high loads and provide availability and communication between different server versions. For example,…

Is GDPR Making Ransomware Worse?

As a landmark piece of legislation, the General Data Protection Regulation (GDPR) was undoubtedly created with the safety and privacy of European consumers’ personal data in mind. However, while certainly…

DirtyMoe: Rootkit Driver

Avast –  Avast –  Abstract In the first post DirtyMoe: Introduction and General Overview of Modularized Malware, we have described one of the complex and sophisticated malware called DirtyMoe. The…

Biden Releases Memo on Critical Cybersecurity Infrastructure Bill

Trend Micro – Trend Micro – United States President Joe Biden recently released a memorandum on improving cybersecurity for critical infrastructure control systems. The memo is a product of a…

Ulta Beauty CISO discusses compliance challenges

Trend Micro – Trend Micro – As new technologies continue to develop, combined with increasing data privacy and security regulations, cybersecurity must keep pace to maintain compliance, consumer trust, and…