Defeat Ransomware
08
May
2023

Learn How to Defeat Ransomware with Identity-Focused Protection

May 08, 2023The Hacker NewsWebinar / Ransomware Are you concerned about ransomware attacks? You’re not alone. In recent years, these…

Dating Apps And Sites: Mitigating Chargebacks In 2023
08
May
2023

McGregor Cyber Attack By Akira Ransomware Group

The Akira ransomware group listed the McGregor company on its victim list. The McGregor cyber attack was conducted early in…

Detectify's Year in Review 2017
08
May
2023

Detectify’s Year in Review 2017

December is here again and the year is coming to a close even though it feels like it was January…

Sun Pharma Cyber Attack, ALPHV Hacker Group Leaks Data
08
May
2023

Sun Pharma Cyber Attack, ALPHV Hacker Group Leaks Data

In the ongoing story of the Sun Pharma cyber attack, the alleged hacker group has started leaking stolen data from…

Dating Apps And Sites: Mitigating Chargebacks In 2023
08
May
2023

Rise In IT Supply Chain Attacks By OilRig APT In Middle East

Infamous OilRig Advanced Persistent Threat (APT) group that has been active in the Middle East and Turkiye for over a…

Threat Hunting and Threat Intelligence Program
08
May
2023

How to Set Up a Threat Hunting and Threat Intelligence Program

Threat hunting is an essential component of your cybersecurity strategy. Whether you’re getting started or in an advanced state, this…

Six years of the GitHub Security Bug Bounty program
08
May
2023

Six years of the GitHub Security Bug Bounty program

This guest blog post was authored by Brian Anglin, Application Security Engineer at GitHub and originally published on the GitHub…

7 biggest security news of 2017
08
May
2023

7 biggest security news of 2017

Cloud security, ransomware, and poor incident responses have all shaped security discussions in 2017. Another interesting year in security has…

Best Practices to Reduce the Threats of Cyberattacks
08
May
2023

Best Practices to Reduce the Threats of Cyberattacks

Today’s online environment is a virtual minefield where explosions might happen at any time. Cyberattacks are always lurking in the…

08
May
2023

MSI’s firmware, Intel Boot Guard private keys leaked

The cybercriminals who breached Taiwanese multinational MSI last month have apparently leaked the company’s private code signing keys on their…

5 Best Practices For Securing RESTful APIs In 2023
08
May
2023

5 Best Practices For Securing RESTful APIs In 2023

Whether you are a developer or not, we all use APIs (Applications Programming Interfaces). You can use them as a…

Hack for Good: Easily Donate Bounties to WHO’s COVID-19 Response Fund
08
May
2023

Hack for Good: Easily Donate Bounties to WHO’s COVID-19 Response Fund

The community has come together in some amazing ways to support COVID-19 relief efforts from Marc Rogers’ CTI League, the…