cyber threat

Schneier - Crypto-Gram September 15, 2000

2000/09/15 :  Schneier published his monthly newsletter and explains here his opinion on full disclosure debate.

"What’s interesting is that everybody wants the same thing; they’re just disagreeing about the best way to get there.
When a security vulnerability exists in a...Read more

Trojan Source: Invisible Vulnerabilities (Boucher and Anderson article)

2021/10/30 : Nicholas Boucher and Ross Anderson "present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye." This new threat has been called 'Trojan Source'.

Read more

Schneier - Cypto-Gram July 15, 2000

2000/07/15 : Bruce Schneier publishes his monthly crypto-gram, talking about the full disclosure CIA just faced and Counterpane Internet Security News, among other things.

This artifact is part of the ...Read more

OWASP Top 10 - 2017

2017 : The Open Web Application Security Project (OWASP) publish their list upon the Ten Most Critical Web Application Security Risks.Read more

Improving the Security of Your Site by Breaking Into it

"In this paper we will take an unusual approach to system security. Instead of merely saying that something is a problem, we will look through the eyes of a potential intruder, and show why it is one. We will illustrate that even seemingly harmless network services can...Read more

‘Trojan Source’ Bug Threatens the Security of All Code (Krebs on Security)

2021/11/01 : Brian Krebs explains the vulnerability “Trojan Source” in his blog.

Read more

Subscribe to cyber threat