US warns that Chinese government is using 'wide variety' of methods, some illegal, to steal trade secrets

Written by AJ Vicens Oct 22, 2021 | CYBERSCOOP The Chinese government’s aggressive push to dominate emerging technology such as artificial intelligence, quantum computing, and biotechnology make Beijing the “primary…

Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative

Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative Microsoft has teamed up with Intel and Goldman Sachs to push for hardware security improvements that could help…

Squirrel Bug Lets Attackers Execute Code in Games, Cloud Services

The out-of-bounds read vulnerability enables an attacker to escape a Squirrel VM in games with millions of monthly players – such as Counter-Strike: Global Offensive and Portal 2 – and…

A Guide to Doing Cyberintelligence on a Restricted Budget

Cybersecurity budget cuts are everywhere. Chad Anderson, senior security researcher at DomainTools, discusses alternatives to fancy tooling, and good human skills alignment. For those in the industry, it comes as…

It’s Not You. It’s Them. On Hacking and Responsible Disclosure.

WordFence –  WordFence –  A story was recently posted to Hacker News celebrating a hack of IoT devices at a school that let a student and their friends rickroll the…

The Complete Guide to IoT Security and What Every Business Owner Needs to Know

We might feel that technology plays an enormous role in our lives, always with our eyes on our phones or turning on the TV right after we got home –…

Rickroll Grad Prank Exposes Exterity IPTV Bug

IPTV and IP video security is increasingly under scrutiny, even by high school kids. When Township High School District 214 in Illinois got rickrolled all at once across its six…

Marketers want to influence your dreams, consumers not so much

Digital marketers are wildly bullish on dream tech — playing ads right before people sleep to influence dreams — and 39% of consumers are open to the technology too, according…

1 in 15 organizations runs actively exploited version of SolarWinds: Report

ZDNet Recommends Best security key 2021 While robust passwords go a long way to securing your valuable online accounts, hardware-based two-factor authentication takes that security to the next level. Read…

Microsoft Azure customer hit by 2.4 Tbps DDoS attack

Microsoft has confirmed to mitigate a massive DDoS attack originated from a botnet comprising 70,000 compromised IoT devices. Microsoft reported that an unnamed customer of its Azure cloud platform was…