Author: Cybernoz
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself….
Reminder: CFP for ICS Cybersecurity Conference Closes June 30th 1 The official Call for Presentations (CFP) for SecurityWeek’s 2023 Industrial…
The cybersecurity researchers at Security Joes recently discovered a new injection technique that is dubbed “Mockingjay.” The threat actors could…
By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged…
How do you tell that your plane ticket is real? If it checks out on the airline’s website, you’re good…
By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and…
In keeping with all other technology plans in the region, The Dubai Internet of Things (IoT) Strategy has the lofty ambition…
A day after claiming to have targeted numerous websites in the healthcare sector of Romania, the pro-Russian hacker collective UserSec…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Philippine police backed by commandos staged a massive raid on Tuesday and said they rescued more than 2,700 workers from…
Cybersecurity researchers at Censys referred to publicly-accessible exposed interfaces as “low-hanging fruit” for cybercriminals, as they can easily gain unauthorized…
Australian Prime Minister Anthony Albanese was in the cybersecurity news last week when he advised people to reboot their devices…











