The complexities of scaling AppSec teams and how to address them in 2025 | Blog
28
Jan
2025

The complexities of scaling AppSec teams and how to address them in 2025 | Blog

Tom Ryder | 28 January 2025 at 13:08 UTC Your organization’s application portfolio is growing and so are the risks….

Why Cybersecurity At The Olympics (And All Major Global Events) Shouldn’t Take A Backseat
28
Jan
2025

Why Cybersecurity At The Olympics (And All Major Global Events) Shouldn’t Take A Backseat

Although the 2024 Summer Olympics brought more than 15 million visitors to Paris and generated $11 billion in economic activity,…

28
Jan
2025

Europeans targeted with new Tor-using backdoor and infostealers

A financially motivated threat actor has been targeting German and Polish-speaking users with info-stealing malware and TorNet, a previously undocumented…

DeepSeek: Welcome to US artificial intelligence’s Sputnik moment
28
Jan
2025

DeepSeek: Welcome to US artificial intelligence’s Sputnik moment

Following last weekend’s introduction of the latest large language model (LLM) from DeepSeek, ChatGPT’s new artificial intelligence (AI) rival has…

28
Jan
2025

Hiya AI Phone blocks spam and irrelevant calls

Hiya has introduced Hiya AI Phone, an AI call assistant mobile app. Designed for busy professionals, Hiya AI Phone acts…

AI SOC Analysts
28
Jan
2025

Propelling SecOps into the future

Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes…

Hackerone logo
28
Jan
2025

Severity Does Not Mean Priority

Automated scanners and tools are noisy; they do not know your business and can’t extrapolate context to truly understand validity…

Crack Modern Hashing Algorithms
28
Jan
2025

How Long Does It Take Hackers to Crack Modern Hashing Algorithms?

While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong…

API Security
28
Jan
2025

How Machine Learning Enhances API Security in Open Banking Platforms

The financial sector is transforming significantly in an era of unprecedented digital connectivity. The advent of open banking platforms, characterized…

28
Jan
2025

Apple zero-day vulnerability exploited to target iPhone users (CVE-2025-24085)

Apple has shipped a fix for a zero-day vulnerability (CVE-2025-24085) that is being leveraged by attackers against iPhone users. About…

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations
28
Jan
2025

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

Jan 28, 2025Ravie LakshmananRansomware / Threat Intelligence Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging…

Datafy promises to slash massive EBS overprovisioning costs
28
Jan
2025

Datafy promises to slash massive EBS overprovisioning costs

AWS EBS – Elastic Block Storage – customers usually massively over-provision cloud storage capacity and pay way more than they…