With change a constant, IT professionals looking to improve their careers can benefit from the latest insights into employers’ needs. Data from Foote Partners on […]
Author: cyberbytes
HTTP/2 MadeYouReset Vulnerability Enables Massive DDoS Attacks
Security researchers have disclosed a critical vulnerability in the HTTP/2 protocol that could enable massive distributed denial-of-service (DDoS) attacks, potentially affecting millions of web servers […]
SIEM-Kaufratgeber
Die kontextuellen Daten, die SIEM-Lösungen liefern, sind eine grundlegende Komponente moderner Security-Stacks. PeopleImages.com – Yuri A | shutterstock.com Protokoll-Daten zu auditieren, zu überprüfen und zu […]
Cisco Secure Firewall Vulnerability Lets Attackers Execute Remote Shell Commands
Cisco has disclosed a critical security vulnerability in its Secure Firewall Management Center software that could allow unauthenticated attackers to remotely execute shell commands with […]
Google Chrome Enterprise: Advanced Browser Security for the Modern Workforce
In this Dark Reading News Desk interview, Google’s Mark Berschadski highlights the critical role browsers play in today’s work environment and how Chrome Enterprise is […]
Matrix protocol bugs could let hackers seize control of sensitive chat rooms
The nonprofit Matrix Foundation, custodian of the eponymous open standard communications protocol, has released details and patching information for two vulnerabilities that could allow hackers […]
FIDO authentication undermined
The FIDO standard is generally regarded as secure and user-friendly. It is used for passwordless authentication and is considered an effective means against phishing attempts. […]
Fortinet patches critical flaw with public exploit in FortiSIEM
Fortinet fixed multiple vulnerabilities across its products this week, including a critical flaw in FortiSIEM that can allow unauthenticated attackers to execute unauthorized code or […]
State and Local Leaders Lobby Congress for Cybersecurity Resources
Federal funding cuts to the Multi-State Information Sharing and Analysis Center (MS-ISAC) are about to leave more than 18,000 state and local organizations without access […]
Downgrade Attack Allows Phishing Kits to Bypass FIDO
You probably can’t break FIDO authentication. Still, researchers have shown that there are ways to get around it. ​The original article found on darkreading Read […]