A zero trust model addresses many of the security concerns around supporting large numbers of remote workers.
Stories by Lucian Constantin
The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown.
Researchers reveal that a previously known Intel flaw is unpatchable and could allow attackers to compromise the cryptographic chain of trust in Intel systems.
New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable.
Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems.
Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes.
A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack.
New report from IOActive details implementation errors that expose LoRaWAN networks to attack and provides a framework for mitigating the risk.
Software that writes more data to a memory buffer than it can hold creates vulnerabilities that attackers can exploit. Good software development practices can stop buffer overflows from happening.
Researchers have recently detected an advanced persistent threat campaign that targets critical infrastructure equipment manufacturers.
By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys.
Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices.
Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system.
A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.
Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work.