Evolve Bank
09
Jul
2024

Evolve Bank says data breach impacts 7.6 million Americans

Evolve Bank & Trust (Evolve) is sending notices of a data breach to 7.6 million Americans whose data was stolen…

Browser Rendering Process PDF Pricing
09
Jul
2024

Researcher Exploits Browser Rendering Process to Alter PDF Pricing

A cybersecurity researcher, Zakhar Fedotkin, demonstrated how differences in PDF rendering across various browsers and operating systems can be exploited…

AttackIQ Mission Control simplifies security testing for distributed teams
09
Jul
2024

AttackIQ Mission Control simplifies security testing for distributed teams

AttackIQ has introduced a new functionality for enterprise customers – AttackIQ Mission Control. AttackIQ Mission Control enhances AttackIQ Enterprise BAS…

RADIUS Protocol Vulnerability
09
Jul
2024

RADIUS Protocol Vulnerability Exposes Networks to MitM Attacks

Jul 09, 2024NewsroomVulnerability / Network Security Cybersecurity researchers have discovered a security vulnerability in the RADIUS network authentication protocol called…

Deep dive: How Pure Fusion plans to implement storage classes
09
Jul
2024

Deep dive: How Pure Fusion plans to implement storage classes

Flash storage pioneer Pure Storage recently announced it will upgrade its Fusion control plane to make storage capacity in its…

Hackerone logo
09
Jul
2024

What Is the Digital Operational Resilience Act (DORA)?

DORA focuses on Information and Communications Technology (ICT) systems and applies to all financial institutions in the EU. This includes…

how-to-prepare-for-iso-270012022s-threat-intelligence-requirements
09
Jul
2024

How to Prepare for ISO 27001:2022’s Threat Intelligence Requirements

Countdown to October 2025 As the cybersecurity landscape continues to evolve and become more complex, international regulations are similarly following…

Grappling With The Cybersecurity Talent Shortfall
09
Jul
2024

Grappling With The Cybersecurity Talent Shortfall

09 Jul Grappling With The Cybersecurity Talent Shortfall Posted at 08:48h in Blogs by Di Freeze This week in cybersecurity…

GuardZoo spyware used by Houthis to target military personnel
09
Jul
2024

GuardZoo spyware used by Houthis to target military personnel

Lookout discovered GuardZoo, Android spyware targeting Middle Eastern military personnel. This campaign leverages malicious apps with military and religious themes…

Jenkins Groovy Plugin
09
Jul
2024

Hackers Exploiting Jenkins Script Console for Cryptocurrency Mining Attacks

Jul 09, 2024NewsroomCI/CD Security / Server Security Cybersecurity researchers have found that it’s possible for attackers to weaponize improperly configured…

Data is the key to unlocking the UK’s AI potential
09
Jul
2024

Data is the key to unlocking the UK’s AI potential

While data has the potential to boost the UK economy significantly, the links between data and AI are not sufficiently…

Chinese Cyber Group Exploits Home Devices
09
Jul
2024

Chinese Cyber Group Exploits Home Devices

The UK and its international allies have issued a new advisory shedding light on the evolving techniques of China state-sponsored…