Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
By: , Chief Information Security Officer, . As you may have noticed, daily headlines around and its impact on technologies are becoming…
The Welsh government has today launched a Cyber Action Plan for Wales, outlining four priorities to bolster the country’s cyber…
Revealed at Security@, HackerOne adds PagerDuty, ServiceNow, Splunk, SumoLogic to advance workflows HackerOne, the world’s most trusted hacker-powered security platform,…
The U.S. Department of Justice announced today the indictment of Russian citizen Denis Gennadievich Kulkov, suspected of running a stolen…
Dashlane introduced Passwordless Login, a technology that eliminates the need to create a master password to access Dashlane. The company…
May 03, 2023Ravie LakshmananCyber Espionage / Malware A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government,…
Data classification is an essential pre-requisite to data protection, security and compliance. Firms need to know where their data is…
The year started off with a bang as the research of Meltdown and Spectre rendered almost all computing devices to…
A researcher hijacked over a dozen Packagist packages—with some having been installed hundreds of millions of times over the course…
Vanta launched Vendor Risk Management (VRM) solution, enabling organizations to accelerate, automate and simplify third-party vendor security reviews and due…
May 03, 2023Ravie LakshmananPassword Security / Authentication Almost five months after Google added support for passkeys to its Chrome browser,…