Black Hat Q&A: Cracking Apple’s T2 Security Chip


As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization – and what to do if you can’t afford to build one.

A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.