OWASP Seoul Meetup | HAHWUL
2025.08.26 OWASP Seoul Meetup Recap At the recent OWASP Seoul Meetup, I had the opportunity to speak on the topic of open source. I was…
2025.08.26 OWASP Seoul Meetup Recap At the recent OWASP Seoul Meetup, I had the opportunity to speak on the topic of open source. I was…
Imagine a world where today’s encryption, the very foundation of digital trust, can be unraveled in seconds. This isn’t science fiction – it’s the promise…
It’s that time of the year again– time to renew the corporate cyber insurance policy, and as the most senior cyber security professional in the…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Zscaler, Palo Alto Networks, SpyCloud among the affected by Salesloft…
The year 2025 has unfolded in an environment marked by eroding trust in vulnerability databases, an explosive growth in cyberattacks, and digital overload for businesses.…
Investigations into the Nx “s1ngularity” NPM supply chain attack have unveiled a massive fallout, with thousands of account tokens and repository secrets leaked. According to…
VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia’s judicial system that deliver malware. VirusTotal detected this campaign…
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed…
In the world of cybersecurity, the adage “a fool with a tool is still a fool” serves as a potent reminder that technology alone, no…
Qantas cuts executive bonuses by 15% after a July data breach Pierluigi Paganini September 06, 2025 Qantas cuts executive bonuses by 15% after a July…
Urgent security alert for SAP users! A critical vulnerability (CVE-2025-42957) allows attackers to take full control of your system. Find out if your SAP S/4HANA…
SMBs are particularly vulnerable to cyberattacks. Here are alarming statistics from SecureWorld that should make Small- to Medium-sized Businesses immediately review their cybersecurity protocols: 46 percent of…