Privacy, Security Concerns Mount Over Microsoft Recall Feature

Duo Outage

Thirty Minutes or Less: An Oral History of the LØpht, Part Three

CISA Wants to Shift Security Liability to Tech Companies

Google Details Tools of Commercial Spyware Vendor Variston

Researchers Demo Bluetooth Relay Attack Against Tesla

Critical Container Escape Flaw in CRI-O

SHA-1 'Fully and Practically Broken' by New Collision (2020)

An Oral History of the L0pht

Dan Kaminsky once found a flaw in DNS that would have destroyed the internet

The Beer Drinker’s Guide to SAML

Finding Radio Frequency Side Channels

Beer Drinkers Guide to SAML

Docker Bug Allows Root Access to Host File System

Microsoft will no longer recommend forcing periodic password resets

Toward a Framework for Misinformation Campaigns

Democratizing Chrome Extension Security

Deciphering the Messages of Apple’s T2 Coprocessor

Secure Boot in the Era of the T2

We Got to Be Cool About This: An Oral History of L0pht, Part 1

Manual chip decapsulation

Apple iMac Pro and Secure Storage

The Apple of Your EFI

Hunting for Malicious npm Packages

What is a backdoor?

Over 18,000 Redis Instances Targeted by Fake Ransomware

Out-Of-Box Exploitation: A Security Analysis of OEM Updaters

Verizon 2016 DBIR: Phishing, Known Vulnerabilities & Credentials