An Integrated Approach Is Essential for Combating Insider Threats — Here’s Why
Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and the Middle East, for example,…
Insider threats are a growing phenomenon, but many businesses aren’t yet doing enough to protect themselves effectively. In Europe and the Middle East, for example,…
Researchers spotted a new infostealer, dubbed ‘Invicta Stealer’, being promoted by its developer on Facebook, leveraging the social media platform to connect to buyers and…
Image: Bing Image Creator Emby says it remotely shut down an undisclosed number of user-hosted media server instances that were recently hacked by exploiting a previously…
Birmingham City Council’s new council leader has informed local newspapers of spiralling costs in a major enterprise resource planning (ERP) upgrade project. In an interview…
To learn more about how legal teams and federal enforcers view hacker-powered security, we invited Megan Brown, partner, and Matthew Gardner, attorney, from the Privacy…
The city of Augusta in Georgia, U.S., has confirmed that the most recent IT system outage was caused by unauthorized access to its network. The administration…
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intellexa (previously Cytrox). Predator…
In January 2016, the Tor Project launched its first private bug bounty program on HackerOne. Today the Tor Project announced its public bug bounty program.…
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency when connecting smartphones…
Networking technology giant Cisco has become the latest supporter of Manchester’s growing Digital Security Hub (DiSH) cyber security accelerator, launching a series of initiatives to…
We are glad to announce our new functionality for defining Scope! HackerOne’s Vulnerability Taxonomy now includes Severity, Weakness type, and Asset. What is Scope? Your…
A former IT security analyst who exploited an opportunistic ransomware attack to impersonate the attackers and conduct his own, secondary cyber attack on his employer…