Achieving Multi-Dimensional Security through Information Modeling – Part 1

Information modeling blends lateral thinking and deductive logic. Applied to information security, it’s a powerful technique for designing a security architecture with multi-dimensional controls...

The Conflicting Obligations of a Security Leader

Faced with competing pressures, CISOs are ultimately the experts at assessing what’s truly at stake in their organizations. - Read more

DDoS’s Newest Minions: IoT Devices (Volume 1)

The latest evolution of cyber weapons is brought to you by the default passwords in Internet of Things (IoT) devices. - Read more

Web Injection Threats: The Cost of Community Engagement on Your Site

Customer engagement drives web application design, but user-generated content brings inherent security challenges. - Read more

Latest article

Microsoft Exchange, Windows 11, and Cursor Zero-Days Exploited on Pwn2Own Day 2

Pwn2Own Berlin 2026 is rapidly escalating into one of the most intense offensive security contests in recent years, with Day Two delivering a fresh...

CVE-2026-42945: Imperva Customers Protected Against Critical NGINX Rewrite Module Vulnerability

TL;DR: Researchers recently disclosed CVE-2026-42945, a critical heap-based buffer overflow vulnerability affecting both NGINX Open Source and NGINX Plus. The flaw exists within the...

Expired domain leads to supply chain attack on node-ipc npm package

A popular npm package called node-ipc has been compromised, with hackers publishing malicious versions that bundle credential stealing malware. The...