"While some outlets are calling this a ‘hack’…. —it’s an attack. It underscores how disruptions to availability can be just as damaging as breaches of confidentiality or integrity. Taking platforms offline can be just as damaging as stealing information. But beyond the attack itself, what’s interesting is the chaos of attribution and how multiple threat actors may be involved or simply capitalizing on the moment.
GUEST RESEARCH: Radware, a leading provider of cyber security and application delivery solutions, released its first half 2023 global threat analysis report.
GUEST RESEARCH: Killnet strikes again.
GUEST RESEARCH: The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing the trend that was observed in the first half of 2022, Nozomi Networks Labs researchers saw hacktivists shift tactics from data theft and distributed denial of service (DDoS) attacks to utilising more destructive malware in an attempt to destabilise critical infrastructure to further their political stance in the Russia/Ukraine war.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]