Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BitForge: Fireblocks researchers uncover vulnerabilities in over 15 major wallet providers

The Fireblocks cryptography research team has uncovered BitForge – a series of zero-day vulnerabilities in some of the most widely adopted implementations of multi-party computation (MPC) protocols, including GG-18, GG-20, and Lindell17.

Active Directory Group Naming: Examples & Best Practices

Imagine being named XYZ in a crowd of other XYZs – a purposeless name that creates confusion and does not communicate a purpose, adding to the cognitive pile of everyone’s day-to-day tasks. Similarly, Active Directory groups created by users need to have logical names so that current and future users do not find themselves stuck in a pickle.

Understanding Light Flux: Illuminating the Basics of Luminous Energy

Light is one of the key aspects of vision that has long fascinated humans. From how light illuminates our world and shapes perception to understanding its scientific implications - the concept of light flux stands as the cornerstone for understanding how this energy influences lives.

What End-of-life Software Means for Your Business

Technology in the modern era moves fast. Historically, new technologies emerged quickly as well, but novelty in the age of computing occurs in a matter of days, sometimes even minutes. Do you use the same computer or cell phone that you did five years ago? And how often do you run software updates or patches on your devices?

What Are Common Indicators of a Phishing Attempt?

Common indicators of a phishing attempt include warnings from your email service provider, urgent language, threat of dire consequences, too-good-to-be-true offers and more. Continue reading to learn what to look for to spot phishing attempts and how to keep yourself protected.

Colorado Public School Students at Risk Because of Department of Education Breach

The Colorado Department of Higher Education is the government organization responsible for overseeing public education throughout the state. The organization implants most education-related policies and also manages data for educational institutions. This organization recently suffered from a significant data breach, leading to information losses for students associated with public schools throughout Colorado. It's an issue that could result in widespread data losses.

Defender Pretender: When Windows Defender Updates Become a Security Risk

The SafeBreach Labs team is committed to conducting original research to uncover new threats and ensure our Hacker’s Playbook provides the most comprehensive collection of attacks. As part of our recent research efforts, we discovered a vulnerability in the Windows Defender update process that could effectively allow an unprivileged user to take full control of the Windows Defender tool and leverage it for future malicious activities.