The day's top cybersecurity news and in-depth coverage
November 13, 2020
If you donât have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look. Read more â¶
Attackers could use the vulnerability to access encryption keys from the Linux kernel's memory or Intel SGX enclaves.
This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.
A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victimâs computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.
Voters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.
Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.