Chrome extensions still track user data
15
May
2023

Chrome extensions still track user data

It will soon be a year since we published our article exposing how Chrome extensions track their users. The research…

Black Basta Ransomware attack on ABB Group LTD
15
May
2023

Philadelphia Inquirer possibly hit by ransomware attack

Daily news paper ‘The Philadelphia Inquirer’ has been apparently hit by a cyber attack of ran-somware attack and it is…

miessler-aail-artistic-influence-ai
15
May
2023

Artistic AI Influence Level (AAIL) v1.0

A system for rating how much AI was involved in the creation of a piece of art Created/Updated: May 15,…

Facebook glitch sent unintended friend requests to users
15
May
2023

Facebook glitch sent unintended friend requests to users

Facebook, the popular social media platform owned by Meta, recently encountered a glitch that resulted in unintended friend requests being…

airBaltic
15
May
2023

Airline exposes passenger info to others due to a ‘technical error’

airBaltic, Latvia’s flag carrier has acknowledged that a ‘technical error’ exposed reservation details of some of its passengers to other airBaltic…

Q&A with HackerOne’s VP of Customer Success Jeff McBride
15
May
2023

Q&A with HackerOne’s VP of Customer Success Jeff McBride

“As cliche as it sounds, customer success is everyone’s job. Everyone’s,” said Jeff McBride when we asked him about his…

Hacker
15
May
2023

New RA Group ransomware targets U.S. orgs in double-extortion attacks

A new ransomware group named ‘RA Group’ is targeting pharmaceutical, insurance, wealth management, and manufacturing firms in the United States…

OT Networks
15
May
2023

11 New Vulnerabilities Expose OT Networks

May 15, 2023Ravie LakshmananNetwork Security / SCADA Several security vulnerabilities have been disclosed in cloud management platforms associated with three…

Detectify launches a crowd-based security program to ensure an always updated service
15
May
2023

Detectify launches a crowd-based security program to ensure an always updated service

We have strengthened our security team with a crowdsourced bug bounty program (currently in beta phase). The initiative, known as…

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score
15
May
2023

WSN Network Node Malicious Intrusion Detection Method Based on Reputation Score

Abstract: Wireless sensor network (WSN) is the Internet of Things by a large number of sensors in the external physical…

Demand for access to talent driving UK IT outsourcing growth
15
May
2023

Demand for access to talent driving UK IT outsourcing growth

Increasing demand for IT talent is driving the IT outsourcing sector, with 63% of UK organisations planning to continue outsourcing…

SaaS Security
15
May
2023

Why High Tech Companies Struggle with SaaS Security

It’s easy to think high-tech companies have a security advantage over other older, more mature industries. Most are unburdened by…