Tag: capture the flag
According to the Defense Advanced Research Projects Agency (DARPA), it takes an average of 312 days for security pros to discover software vulnerabilities such as viruses, malware, and other attacks. In hacker time, that’s a virtual eternity in which bad actors can wreak havoc within infected systems and steal information, all without being noticed. DARPA…
Read MoreAPIs Power Applications—and Pose Security Challenges Application programming interfaces (APIs) form the chassis for modern applications. They are interfaces to software components that developers use to integrate valuable information into their applications (like Google Maps in a rideshare app or YouTube videos into a webpage) and they are everywhere—even in security products. APIs are key…
Read MoreRecent Posts
- Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
- CISA, Microsoft Confirm High-Severity Windows Vulnerability Exploited
- Microsoft fixes bug crashing Microsoft 365 apps when typing
- Election Cybersecurity – Canary Trap
- CISA warns of Windows flaw used in infostealer malware attacks