On #THCBGang I hosted the double trouble of vaunted futurists Ian Morrison (@seccurve) & Jeff Goldsmith, and medical historian Mike Magee (@drmikemagee) for an hour of conversation and banter about the health care system, the world in politics, and whether…
In today’s healthcare, medical devices are crucial but vulnerable, as noted by the European Commission’s NIS2 directive. To combat cybersecurity threats, Palo Alto Networks has
A newly discovered vulnerability in Microsoft’s Windows Deployment Services (WDS) allows attackers to remotely crash servers with zero user interaction. By exploiting the UDP-based TFTP
Researchers have discovered a new attack method called “Bring Your Own Installer” that disables SentinelOne’s endpoint security during upgrades, allowing ransomware like Babuk to be
The T1555.003 technique, highlighted in the MITRE ATT&CK framework, allows attackers to extract saved usernames and passwords from web browsers, leading to unauthorized access and