Hackerone logo
28
Nov
2024

Prove Your Worth: How to Measure Cybersecurity ROI and Impress Your Board

CISOs often struggle with proving ROI from security initiatives when trying to secure buy-in from the board and prioritize budget….

Hacker monitoring compromised servers
28
Nov
2024

Hackers exploit ProjectSend flaw to backdoor exposed servers

Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote…

AGD wants to go 'cloud native' in transformation push
27
Nov
2024

AGD wants to go ‘cloud native’ in transformation push – Cloud

The Attorney-General’s Department (AGD) is looking to transform itself into a cloud-native organisation through its ongoing IT strategy. The agency…

Zello
27
Nov
2024

Zello asks users to reset passwords after security incident

Zello is warning customers to reset their passwords if their account was created before November 2nd in what appears to…

South East Water nears go-live for first AI use cases
27
Nov
2024

South East Water nears go-live for first AI use cases – Cloud – Software

South East Water is on the cusp of going live with two Salesforce AI services that it hopes will allow…

Hackerone logo
27
Nov
2024

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

Windows 11 AI
27
Nov
2024

Microsoft says it’s not using your Word, Excel data for AI training

​Microsoft has denied claims that it uses Microsoft 365 apps (including Word, Excel, and PowerPoint) to collect data to train…

Cybercriminals used a gaming engine to create undetectable malware loader
27
Nov
2024

Cybercriminals used a gaming engine to create undetectable malware loader

Threat actors are using an ingenious new way for covertly delivering malware to a wide variety of operating systems and…

Hackerone logo
27
Nov
2024

Why This Moment In Cybersecurity Needs Hackers To Protect All Software

Originally published in Security Magazine When the pandemic hurled us into a cybersecurity crisis, there were some who held out…

Chinese APT Hackers Using Multiple Tools And  Vulnerabilities To Attack Telecom Orgs
27
Nov
2024

Chinese APT Hackers Using Multiple Tools & Vulnerabilities To Attack Telecoms

Since 2023, the Chinese APT group Earth Estries (aka Salt Typhoon, FamousSparrow, GhostEmperor, and UNC2286) has mostly targeted government agencies…

27
Nov
2024

Executive Insights Series 3 E04: Dynamic data in the AI era – Partner Content – Promoted Content – Security

If the first wave of viable AI learned to walk with chatbots and basic automations, AI is now poised to…

A complete guide for beginners
27
Nov
2024

A complete guide for beginners

Bug bounty hunting can seem overwhelming when you’re just starting, especially when you are coming from a non-technical background. And…