Webinar Recap: Attorneys Chime in on Hacker-Powered Security
To learn more about how legal teams and federal enforcers view hacker-powered security, we invited Megan Brown, partner, and Matthew Gardner, attorney, from the Privacy…
To learn more about how legal teams and federal enforcers view hacker-powered security, we invited Megan Brown, partner, and Matthew Gardner, attorney, from the Privacy…
The city of Augusta in Georgia, U.S., has confirmed that the most recent IT system outage was caused by unauthorized access to its network. The administration…
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox). Predator…
In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor Project announced its public bug bounty program.…
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones…
Networking technology giant Cisco has become the latest supporter of Manchester’s growing Digital Security Hub (DiSH) cyber security accelerator, launching a series of initiatives to…
We are glad to announce our new functionality for defining Scope! HackerOne’s Vulnerability Taxonomy now includes Severity, Weakness type, and Asset. What is Scope? Your…
A former IT security analyst who exploited an opportunistic ransomware attack to impersonate the attackers and conduct his own, secondary cyber attack on his employer…
A new variant of Mirai botnet thriving on several vulnerabilities has been targeting Linux-based devices. The three found vulnerabilities analyzed by researchers were CVE-2023-27076, CVE-2023-26801,…
The BlackByte ransomware group has claimed responsibility for the cyber attack on the City of Augusta, ending days of speculation and countering the administration’s claim…
When he’s not reverse engineering malware, Marcus Hutchins (aka @MalwareTechBlog) can be found surfing, partying, or traveling. That’s to be expected for any typical 22-year-old,…
The US and global cybersecurity agencies have issued a joint advisory to bring attention to the activities of “Volt Typhoon,” a state-sponsored cyber actor from…