h1-5411 Recap – Argentina! Oath Bug Bounty
For the first time, HackerOne kicked off fall by migrating south. Way south. All the way to Buenos Aires, Argentina! Oath, a media and tech…
For the first time, HackerOne kicked off fall by migrating south. Way south. All the way to Buenos Aires, Argentina! Oath, a media and tech…
Cyberattacks on city and municipal governments are on the rise, more than double that of a year ago. The increase in breaches is likely due…
Our brand new scan profile overview is finally here! For a long time, we have preached continuous security, encouraging our users to schedule recurring tests…
A large cybercrime enterprise tracked as the “Lemon Group” has reportedly pre-installed malware known as ‘Guerilla’ on almost 9 million Android-based smartphones, watches, TVs, and…
Today we celebrate cyber defense. The U.S. Department of Defense’s Defense Digital Service (DDS) announced expansion of the Hack the Pentagon crowdsourced security program and…
The popular KeePass password manager is vulnerable to extracting the master password from the application’s memory, allowing attackers who compromise a device to retrieve the…
Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method, where a program looks through…
Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware of a report that this…
Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware of a report that this…
In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great tips from an appsec leader…
Microsoft has decided to allow customers to choose when the last bits of Internet Explorer 11 (IE11) will be removed from their devices. This comes…
Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the name implies, is software that spies…