How financial institutions can minimize their attack surface
In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He...
Read more →In this Help Net Security interview, Sunil Mallik, CISO of Discover Financial Services, discusses cybersecurity threats for financial institutions. He...
Read more →Denmark has announced a heightened alert status for the telecommunications sector due to an increased threat from cyber attacks. According...
Read more →In the ever-evolving landscape of cybersecurity, one of the most alarming and dangerous threats is the Zero-Day attack. These attacks...
Read more →The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along...
Read more →Google has announced the launch of OSV-Scanner V2, an open-source tool designed to enhance vulnerability scanning and remediation across various software...
Read more →Application Security Expert monday.com | United Kingdom | Hybrid – View job details As an Application Security Expert, you will...
Read more →Do you need to permanently and securely delete photos from an iPhone to prevent unauthorized access? Simply deleting them isn’t...
Read more →A series of vulnerabilities has been discovered in Espressif Systems’ ESP32 devices, specifically affecting the BluFi module within the ESP-IDF...
Read more →A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and Event Management (SIEM) platform. This...
Read more →In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting significant risks for users who...
Read more →A recent discovery by Palo Alto Networks’ Unit 42 has shed light on sophisticated malware targeting Internet Information Services (IIS)...
Read more →A recent cybersecurity threat has emerged in the form of a steganographic campaign that uses seemingly harmless JPG files to...
Read more →