Designing a Different Future for Women in Technology & Cyber
by Simona Dimovski, Head of Security and Technology, Helia As we celebrate International Women’s Day, marking the advancements of women over the last hundred years,…
by Simona Dimovski, Head of Security and Technology, Helia As we celebrate International Women’s Day, marking the advancements of women over the last hundred years,…
ALPHARETTA, GA, March 7, 2023: Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, today announced that it has been recognized as one…
Two high-value cybercriminals of the DoppelPaymer ransomware gang were arrested after a coordinated action by Europol and several national police departments. Europol, together with the…
Customers affected by the Hatch Bank data breach are suing the company, with US-based consumer right law firm Wolf Haldenstein Adler Freeman & Herz LLP…
The attacks of pro-Russian threat actor NoName on European logistics and transportation companies continue. Lithanian transportation and warehousing logistics services Vlantana and UAB RUSKO are…
A breach data marketplace member has claimed to have gained access to the control panel of JIRA CRM backup of Chinese-owned, US-based business Motorola through…
The Vice Society ransomware group has claimed that it has breached the Hamburg University of Applied Sciences, two months after the institution disclosed a cyber…
The Mallox ransomware group reportedly targeted India based digital marketing and web development company AddWeb Solution Private Limited on March 6, 2023. The cybercriminals claim…
By Ashley Burke, Information Security Program Manager I can’t believe it’s been two years already! I feel like I just entered the cybersecurity field yesterday!…
by Janelle Drolet Vice President, Business Development for Towerwall Cyber threats continue to evolve at a rapid pace, leading to an expanded attack surface populated…
What is web application penetration testing? Web application penetration testing is a web application security technique of identifying and exploiting vulnerabilities in web applications to…
by Christine Bejerasco, CISO, WithSecure As technology develops, there is an ever-expanding workforce and the need to fill vacant positions in the industry. However, women…