Memory safety is the first step, not the last, towards secure software
The U.S. government and technology giants alike are urging developers to replace C and C++ with modern, memory-safe languages like Rust. Will it be enough?
Bad torts: Law firms feel the heat from rising cyber threats
Experts say the sensitive data law firms hold and their lagging attention to cybersecurity make them prime targets.
Death by digital: attacks on healthcare put people at risk
At least one person has died as what was arguably the direct result of a digital attack on a hospital, but cybercriminals seem unlikely to stop.
AI’s peril and promise for policymakers and cyber defenders
At this year’s Billington Summit, experts highlighted the risks and benefits that AI poses for national security and the cybersecurity sector.
How AI could inflame one of the costliest cyber scams
Deepfakes, stolen email addresses and identity fraud drive continued gains in business email compromise attacks. How can defenders fend them off?
Postcards from Hacker Summer Camp 2023
The promise and threat of AI, government policy and surprising revelations about the Viasat hack were among the major takeaways from Black Hat and DEF CON.
Dark Caracal: A bumbling, yet surprisingly effective, cyber mercenary group
At DEF CON, EFF security researcher Cooper Quintin discussed a mysterious group called Dark Caracal that has proven effective despite making many mistakes.
Attackers are on the edge. Where are defenders?
VPNs, virtualization hosts, secure email gateways and other network “edge” devices have become a common entry point for attackers in significant enterprise breaches. How can defenders respond?
Top cyber takeaways from the Intelligence and National Security Summit
Concerns about China and generative AI dominated the cybersecurity discussions at the tenth edition of the Intelligence and National Security Alliance’s annual gathering, which drew hundreds of security professionals, spies and government experts.
As APIs proliferate, attackers follow
With APIs accounting for more than half of all internet traffic, attacks on mobile and web application endpoints continue to grow.
Page