Automated tools to detect microarchitectural attacks
What are microarchitectural attacks – and is it possible to detect them through automated processes?
Read MoreWhat are microarchitectural attacks – and is it possible to detect them through automated processes?
Read MoreBlack Hat Middle East & Africa (MEA), the cyber industry’s fastest-growing event, is on the move. This November’s second edition is relocating to the Riyadh Exhibition & Convention Centre, as it looks to record huge growth in floor space, exhibitors, national and industry pavilions, and speakers.
Read MoreMulti-factor authentication (MFA) is widely promoted as an effective security method, but it does have vulnerabilities – as proven by the 0ktapus MFA attacks in 2022 and 2023.
Read MoreIn this interview, Lance James explains how he integrates Zen into his approach to cybersecurity leadership, and why imposter syndrome holds information security professionals back.
Read MoreFake blockchain games are being used to deliver malware that steals cryptocurrency from digital wallets. When it comes to crypto security, what can we learn from this?
Read MoreChris Wysopal (Founder and CTO at Veracode) famously hacked into Microsoft and then testified in front of the US Congress. Discover his perspective on cybersecurity now.
Read More