Ransomware, Cyberespionage Dominate Verizon DBIR

Verizon’s Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage. Ransomware, Cyberespionage Dominate Verizon DBIR

Attack Method Highlights Weaknesses in Microsoft CFG

As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real. Attack Method Highlights Weaknesses in Microsoft CFG