Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins, as well as criminals and spies. At its most basic level, hashcat guesses a password, hashes it, and then compares the resulting hash to the one...
Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous.
Hacker summer camp is almost upon us again. Here are some of the best talks of all time. Will this year's virtual talks measure up to these legends?
Abandoned domain names are low-hanging fruit for attackers, who can use them to access sensitive email or customer data.
Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.
Is your organization guilty of any of these security measures that don't really do much to protect data or systems?
A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.
Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.