The Latest in IT Security

Posts Tagged ‘vulnerabilities’

New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass endpoint security solutions by manipulating the Windows Container Isolation Framework. The findings were presented by Deep Instinct security researcher Daniel Avinoam at the DEF CON security conference held earlier this month. Microsoft’s container architecture (and by extension, Windows Sandbox) […]

Read more ...

A threat actor with possible connections to Russia’s financially motivated Evilnum group is targeting users in online cryptocurrency trading forums via a now-patched bug in the popular WinRAR file compression and archiving utility. The bug, tracked as CVE-2023-38831, allowed the attackers to hide malicious code in zip archives masquerading as “.jpg,” “.txt,” and other file […]

Read more ...

Vulnerabilities within computer processors can send ripples of concern through the tech industry and beyond. The recent discovery of the “Downfall” vulnerability, which affects a range of Intel central processing units (CPUs), has once again raised questions about the delicate balance between performance enhancements and data security. This vulnerability, discovered by Google research scientist Daniel […]

Read more ...


Categories

FRIDAY, MARCH 14, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments