By Brett Raybould, EMEA Solutions Architect, Menlo Security It is estimated that as many as 100 million users have engaged…
How do you tell that your plane ticket is real? If it checks out on the airline’s website, you’re good…
By Hugh Brooks, Director of Security Operations, CertiK The rapid expansion of the cryptocurrency industry has brought technological innovation and…
In keeping with all other technology plans in the region, The Dubai Internet of Things (IoT) Strategy has the lofty ambition…
A day after claiming to have targeted numerous websites in the healthcare sector of Romania, the pro-Russian hacker collective UserSec…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Philippine police backed by commandos staged a massive raid on Tuesday and said they rescued more than 2,700 workers from…
Cybersecurity researchers at Censys referred to publicly-accessible exposed interfaces as “low-hanging fruit” for cybercriminals, as they can easily gain unauthorized…
Australian Prime Minister Anthony Albanese was in the cybersecurity news last week when he advised people to reboot their devices…
Energy giants Schneider Electric and Siemens Energy have confirmed being targeted by a ransomware group in the recent campaign exploiting…
LetMeSpy, a phone monitoring app, was breached, resulting in unauthorized access to website users’ data. Hacker has taken control of…
IBM QRadar is a popular SIEM (Security Incident and Event Management) tool organizations use to detect and monitor threats. The…