Hackerone logo
30
May
2024

5 Bug Bounty Insights From SIX Group

1. Why VDP and Bug Bounty? At SIX Group, Alex Hagenah emphasized the year-round success of going beyond the regulatory…

BBC HQ
30
May
2024

BBC suffers data breach impacting current, former employees

The BBC has disclosed a data security incident that occurred on May 21, involving unauthorized access to files hosted on…

Beware of Free Piano Messages that Steal Personal Financial Data
30
May
2024

Beware of Free Piano Messages that Steal Personal Financial Data

Hackers target and steal personal and financial data for fraud and other illicit purposes. They also sell the data on…

CryptoChameleon Kit With Group of Tools Propagate Phishing
30
May
2024

CryptoChameleon Kit With Group of Tools Propagate Phishing

CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to…

Full Drive Encryption Only a Half-Measure for Data Security
30
May
2024

Full Drive Encryption Only a Half-Measure for Data Security

Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches…

Cybersecurity Cartoons As Wall Art
30
May
2024

Cybersecurity Cartoons As Wall Art

30 May Cybersecurity Cartoons As Wall Art Posted at 08:53h in Blogs by Di Freeze This week in cybersecurity from…

Europol
30
May
2024

Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware

May 30, 2024NewsroomMalware / Cyber Crime Europol on Thursday said it shut down the infrastructure associated with several malware loader…

Meterpreter Backdoor Hides Malicious Codes
30
May
2024

New Meterpreter Backdoor Hides Malicious Codes Within the Image

ANY.RUN sandbox has analyzed a new strain of Meterpreter backdoor malware that leverages sophisticated steganography techniques to conceal its malicious…

Telerik Report Server Flaw - Attacker Bypass Authentication
30
May
2024

Telerik Report Server Flaw – Attacker Bypass Authentication

A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability…

Most Dangerous Passwords in 2024
30
May
2024

Pop Culture Passwords Most Likely to Get You Hacked, New Study

Is your password “Superman” or “Blink-182”? Millions are using these pop-culture favorites, making them easy targets for hackers. Discover the…

Autonomous SOC Strategy
30
May
2024

How to Build Your Autonomous SOC Strategy

Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a…

The challenges of supporting Copilot+ PCs in the enterprise
30
May
2024

The challenges of supporting Copilot+ PCs in the enterprise

Earlier in May, Microsoft announced the Copilot+ PC, a new category of Windows PC designed for artificial intelligence (AI) applications….