---

Security

2FA, 3FA, MFA: What Does It All Mean?

This guide covers the different types of authentication and how they can be used to secure users and organizations....

Software Threat Modeling and How to Use It Effectively

Kevin Delaney, director of solutions engineering at Security Compass, explains threat modeling and why it's important for software development.

Top Passwords Used in RDP Brute-Force Attacks

Specops Software released research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. Learn...

Canonical Releases New Ubuntu Linux Kernel Security Updates to Fix 16 Vulnerabilities

The new Linux kernel security updates are available only for all supported Ubuntu LTS (Long-Term Support) versions. These include...

The History of Computer Viruses & Malware

Computer viruses and malware have been around since the early 1970's. Explore the full history of viruses from then...

Shadowserver: Get Free Access to Timely, Critical Internet Security Data

The Shadowserver Foundation fulfills a unique role in the cybersecurity ecosystem by supplying vital security information to internet defenders...

High-Severity OpenSSL Vulnerabilities Fixed

Version 3.0.7 of the OpenSSL cryptographic library is out, with fixes for CVE-2022-3602 and CVE-2022-3786 — two high-severity buffer...

Red Hat Hypes a Pair of Flaws That Isn’t Critical or Actively Exploited

Red Hat's recent Twitter and media coverage exaggerate the severity of bugs to compete with Microsoft-affiliated news sites. Learn...

Latest Articles