25
May
2023

The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals

The widespread adoption of remote and hybrid working practices in recent years has brought numerous benefits to various industries, but…

What percentage of your software vulnerabilities have GDPR implications?
25
May
2023

Your TL;DR Summary of The CERT Guide to Coordinated Vulnerability Disclosure

The CERT Coordination Center at Carnegie Mellon University’s Software Engineering Institute (SEI) recently released The CERT Guide to Coordinated Vulnerability…

25
May
2023

Realistic simulations are transforming cybersecurity training

To achieve a diverse and well-trained cybersecurity workforce, organizations recognize the value of a quality training program supported by the…

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?
25
May
2023

GUEST BLOG: Governments Across The World Are Mandating Vulnerability Disclosure So Why Are Companies Sitting On Their Hands?

The IoT Security Foundation’s fifth annual report into the state of vulnerability disclosure consumer Internet of Things, produced by Copper…

25
May
2023

12 vulnerabilities newly associated with ransomware

In March 2023, the total number of breaches reported was higher than those reported in the previous three years combined,…

U.S. Department of Defense VDP Wins Prestigious 2019 DoD Chief Information Officer Award
25
May
2023

XOXO: We Love Coinbase for Loving Bug Bounties

Besides being the world’s most popular way to buy and sell bitcoin, ethereum, and litecoin, Coinbase is a trailblazer in…

CISA updates ransomware guidance
25
May
2023

CISA updates ransomware guidance

CISA has updated its #StopRansomware guide to account for changes in ransomware tactics and techniques. The Cybersecurity and Infrastructure Security…

Tracking down a trojan: An inside look at threat hunting in a corporate network
25
May
2023

An inside look at threat hunting in a corporate network

How Malwarebytes MDR successfully helped a company detect and respond to the potent banking Trojan QBot. At Malwarebytes, we talk…

HackerOne CEO joins Node.js Foundation Board
25
May
2023

HackerOne CEO joins Node.js Foundation Board

Open source models are the backbone of the modern internet. Therefore, it’s our duty to defend them. That’s why HackerOne…

How Coffee County Schools safeguards 7500 students and 1200 staff
25
May
2023

How Coffee County Schools safeguards 7500 students and 1200 staff

Join our upcoming “Byte into Security” webinar for a deep dive into K-12 cybersecurity. We’re excited to announce that our…

Rheinmetall logo
25
May
2023

Rheinmetall attacked by BlackBasta ransomware

A cyberattack on arms manufacturer Rheinmetall has been claimed by the BlackBasta ransomware group on its leak site. On Friday…

Hackers take on San Francisco for the 4th Year in a Row
25
May
2023

Hacker-Powered Pen Tests and The Power of More

Traditional penetration testing is an important tool in your appsec strategy toolbox. Compliance requires it. Your CIO understands it. Your…