A security vulnerability where malicious input is injected into YAML parsers, leading to code execution or data manipulation.
A pattern-matching framework used to identify and classify malware based on specific characteristics.
A hardware-based authentication method using Yubikey devices to enhance security with one-time passwords and encryption.
Potential threats targeting mobile devices, including malware, phishing, and unauthorized access.
An analysis of the major Yahoo data breaches, exposing billions of user accounts and leading to significant security reforms.
A future computing bug caused by the 32-bit UNIX timestamp overflow, expected to occur in 2038.
A defensive strategy where security teams intentionally allow controlled breaches to study attacker behavior.
A hardware security module (HSM) from Yubico designed for secure cryptographic key storage and operations.
A technique used by attackers to extract authentication tokens from system memory for unauthorized access.
Cyberattacks that compromise YouTube accounts, often through phishing, credential stuffing, or malware.
Security features and potential vulnerabilities associated with the Yandex web browser.
A team within cybersecurity responsible for analyzing security incidents and improving defense mechanisms.
Potential threats associated with the use of Microsoft's Yammer, including data leaks and unauthorized access.
Phishing campaigns specifically targeting Yahoo Mail users to steal credentials and personal information.
Security protocols implemented to protect data and infrastructure in Yandex Cloud services.
Security risks that arise due to improper handling of YAML data, leading to code injection or application crashes.
A cloud-based authentication service by Yubico providing secure identity verification.
Exploiting high-gain Yagi antennas to intercept or boost wireless signals for hacking purposes.
Methods used by attackers to gain unauthorized access to Yahoo accounts, such as credential stuffing or social engineering.
How mobile devices can be exploited for cyberattacks, including through malware, spyware, and wireless vulnerabilities.