Ascension Health, one of the largest health systems in the United States, has reported a significant data security breach that…
Mastercard (NYSE: MA) has officially finalized the acquisition of Recorded Future, a leading provider of AI-driven threat intelligence. Mastercard Operating…
Security researchers have uncovered a technique that takes previously unexploitable reflected input vulnerabilities and turns them into fully functional attacks…
After five years of contentious litigation, Meta Platforms Inc., the parent company of WhatsApp, emerged victorious in its lawsuit against…
One of India’s most popular food delivery apps, McDonald’s McDelivery, was discovered to have critical vulnerability that could have been…
You’ve with no doubt heard or seen other fellow bug bounty hunters find critical vulnerabilities thanks to JavaScript file enumeration,…
As we head into the new year, organizations face escalating governance, security, and regulatory compliance challenges, especially as AI adoption…
The specter of security vulnerabilities is a constant concern in today’s digital landscape. They’re the hidden pitfalls that can undermine…
In the ever-evolving landscape of cybersecurity, regulation often plays a lagging, but critical role in driving industry wide improvements in…
It’s been a busy year in cybersecurity, but it’s not over yet. This week, we revealed how hackers figured out…
HackerOne’s suite of cybersecurity tools, including bug bounty programs and vulnerability disclosure services, is now available through the AWS Marketplace,…
Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks Pierluigi Paganini December 21,…











