Attackers exploit human nature, making authentication a prime target. The Snowflake data breach is a clear example – hackers used stolen customer credentials, many which lacked multi-factor ...
The past two years have brought a lot of new computer-security deployments at CERN. Spurred on by the 2023 cybersecurity audit, the Computer Security ...
Hackers over the past six months have relied increasingly more on the browser-in-the-browser (BitB) method to trick users into providing Facebook account credentials.
2025 saw a huge amount of attacker innovation when it comes to phishing attacks, as attackers continue to double down on identity-based techniques. The continual evolution of phishing means it remains ...
A fix introduced into Windows last month to close a weakness in Kerberos authentication is causing logon failures for some Windows Hello for Business (WHfB) users, Microsoft has warned. In theory, the ...
Help Fill the Talent Gap for Skilled Cybersecurity Professionals. Cybersecurity, the crucial practice of protecting computer systems, networks, programs, and data from digital attacks, is needed NOW ...
If 2024 and 2025 were the years organisations felt the strain of tightening budgets, 2026 is the year those decisions will fully manifest in their cyber risk exposure. Across both the private and ...
Interested contributors now have until 15 October 2025 to submit abstracts for the IAEA’s International Conference on Computer Security in the Nuclear World: Securing the Future, or CyberCon26.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback