Practical Continuous Threat Modeling Work for Your Team
05
Jul
2023

Practical Continuous Threat Modeling Work for Your Team

Izar describes the attributes required by threat modelling approaches in order to succeed in Agile dev environments, how to build…

ChatGPT to ThreatGPT - Generative AI Impact in Cyber Security
05
Jul
2023

ChatGPT to ThreatGPT – Generative AI Impact in Cyber Security

OpenAI launched ChatGPT in November 2022, and the arrival of ChatGPT caused a significant disruption in the AI/ML community. In…

05
Jul
2023

75% of consumers prepared to ditch brands hit by ransomware

As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware…

Dating Apps And Sites: Mitigating Chargebacks In 2023
05
Jul
2023

Riot Games Targeted By Hacker Group Anonymous Sudan

Hacktivist group Anonymous Sudan has claimed that it launched a Distributed Denial of Service (DDoS) attack against American video game…

How to make your phishing campaign a success
05
Jul
2023

How to make your phishing campaign a success

[ This article was originally published here ] Phishing is the most frequently deployed method used by criminals to initiate…

05
Jul
2023

Small organizations face security threats on a limited budget

Small organizations face the same security threats as organizations overall but have less resources to address them, according to Netwrix….

Behind the Scenes: Securing In-House Execution of Unsafe Third-Party Executables
05
Jul
2023

Behind the Scenes: Securing In-House Execution of Unsafe Third-Party Executables

Mukul Khullar, Staff Security Engineer, LinkedIn twitter, linkedinabstract slides video Mukul recommends a three step defense-in-depth process for mitigating these risks. 1….

05
Jul
2023

Island Enterprise Browser: Intelligent security built into the browsing session

In this Help Net Security interview, Mike Fey, CEO of Island, explains the differences between consumer browsers and the Island…

An Attacker’s View of Serverless and GraphQL Apps
05
Jul
2023

An Attacker’s View of Serverless and GraphQL Apps

An overview of functions-as-a-service (FaaS) and GraphQL, relevant security considerations and attacks, and a number of demos. What is Functions-as-a-Service…

Cyber Security & Cloud Expo Europe: Agenda Delivers Beyond Expectations
05
Jul
2023

Cyber Security & Cloud Expo Europe: Agenda Delivers Beyond Expectations

is returning to Amsterdam and is set to take place on 26-27 September at RAI. This year’s edition promises to…

Elderly targeted in car accident scam, kingpin arrested
05
Jul
2023

Elderly targeted in car accident scam, kingpin arrested

The head of a criminal network responsible for defrauding hundreds of elderly people has been arrested, Europol has announced. The…

Securing your Workspaces from a Bot Uprising
05
Jul
2023

Securing your Workspaces from a Bot Uprising

Real TalkOne thing I appreciated about this talk is that Kelly and Nikki kept it real. Most blog posts, talks,…