Burp Everywhere, All Around the World: Bringing AppSec Enthusiasts Together in 2025 | Blog
Amelia Coen | 13 March 2025 at 08:49 UTC Security is a team sport. Whether you’re a pentester, bug bounty hunter, student, or just love…
Amelia Coen | 13 March 2025 at 08:49 UTC Security is a team sport. Whether you’re a pentester, bug bounty hunter, student, or just love…
Click here for full interview. In this show, we speak with Tanya Janca, aka SheHacksPurple, a renowned code security trainer with nearly 30 years of…
Mar 13, 2025Ravie LakshmananOpen Source / Vulnerability Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited…
A vulnerability has been discovered in the Tenda AC7 router, firmware version V15.03.06.44, which allows attackers to execute malicious payloads and gain root access. As…
Cupertino, California – March 13, 2025 – Cyble, a leading global cybersecurity and threat intelligence provider, is proud to announce that it has been honored…
Cybersecurity researchers have uncovered a sophisticated cyber espionage campaign targeting critical network infrastructure, marking a significant evolution in tactics by Chinese state-sponsored hackers. Mandiant, a…
For business leaders around the globe, AI promises an exciting edge in innovation and efficiency. The rapid evolution of AI models – and the agentic…
GitLab announced the release of versions 17.9.2, 17.8.5, and 17.7.7 for both its Community Edition (CE) and Enterprise Edition (EE). These updates include crucial bug…
The adoption of connected medical devices, collectively called the Internet of Medical Things (IoMT), has transformed patient care. However, this technological advancement has also introduced…
The Australian Securities and Investments Commission (ASIC) has taken legal action against FIIG Securities Limited (FIIG) over alleged systemic and prolonged cybersecurity failures. The proceedings,…
Free Webinar – Supply Chain Attack Prevention Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3…
In recent days, some residents have reported receiving two types of fraudulent messages, designed by scammers either to steal personal information via malware or to…