Creators of PunkSpider say they're relaunching their search engine for hackable sites at Defcon next week to spur web admins to fix thousands of unpatched bugs
in the hope of shaming site owners into fixing them. https://www.wired.com/... Thomas Brewster / @iblametom : PunkSpider was super interesting when it first launched but was plagued with legal and com...
A task force of 60+ experts from industry, government, nonprofits, and academia calls on the US and allies to take steps to fight a surge in ransomware attacks
the Secret Weapon to Combatting Ransomware Danny Palmer / ZDNet : Ransomware is now a national security risk. This group thinks it knows how to defeat it Duncan Riley / SiliconANGLE : Expert task for...
Sources: US is investigating a recently discovered hack against federal agencies that used a vulnerability in Pulse Secure VPN, that began during Trump years
Labor Secretary Marty Walsh told a panel of House Appropriators … Stephen E. Arnold / Beyond Search : How Are Those Cyber Security Vendors Performing? (Yes, That Is the Correct Word) Tweets: Chris Bin...
Dan Kaminsky, the celebrated security researcher widely known for his work on discovering crucial DNS security flaws and Sony Rootkit infections, has died at 42
Saddened by news of the death of Dan Kaminsky, a member of the ICANN Trusted … Pierluigi Paganini / Security Affairs : The cybersecurity researcher Dan Kaminsky has died Tweets: Sarah B / @sarahbrie :...
Sources: Chinese hackers are thought to have hacked a payroll agency inside the US Dept. of Agriculture in 2020 by exploiting another bug in SolarWinds software
Update Now Eduard Kovacs / SecurityWeek : China-Linked Hackers Exploited SolarWinds Flaw in U.S. Government Attack: Report Phil Muncaster / infosecurity-magazine.com : US Payroll Agency Targeted in Se...
Profile of Maddie Stone, who leads Google's Project Zero team that studies and neuters actively exploited Android malware
The Project Zero reverse engineer shuts down some of the world's most dangerous exploits—along with antiquated hacker stereotypes. — EVEN WITH A knee injury, Maddie Stone is formidable. Tweets: @how...
How a vulnerability disclosure by researchers to Atrient, a vendor of player reward kiosks for casinos, led to competing claims of assault and blackmail
“Ethical hackers” tried to disclose problems to a casino software company—it got messy. — People who find security vulnerabilities commonly run … Tweets: @vickerysec , @vickerysec , and @k8em0 Tweet...
Interview with three renowned women in infosec on how they got started, some of their most memorable finds, and how to encourage more women to join their field
This post is part of Mashable's ongoing series The Women Fixing STEM, which highlights trailblazing women in science, tech … Tweets: @k8em0 and @infosecsherpa Tweets: Katie Moussouris / @k8em0 : “a hu...
Interview with nine engineers who worked on Google's Safe Browsing, which now underpins user security in all of Google's major platforms and runs on 3B+ devices
IN THE BEGINNING there was phone phreaking and worms. Then came spam and pop ups. And none of it was good. Tweets: @k8em0 , @google_comms , @mediaphyter , and @selenakyle . Thanks: @aaronjstein Twee...
DARPA prevented hackers from taking control of an unmanned drone using “formal methods”, a technique that can verify whether programs are error-free
Kevin Hartnett / Quanta Magazine : Tweets: @k8em0 , @kennwhite and @darpa Tweets: Katie Moussouris / @k8em0 : http://www.quantamagazine.org/ ... “We're not claiming we're going to prove an entire sys...