For customers and hackers, the triage experience is central to hacker-powered security. Our triagers consist of a globally distributed team…
Update: SSRF has been nominated in the new OWASP Top 10 of 2021. The list is currently pending peer reviews,…
T-Mobile recently confirmed another hack, the second this year and ninth since 2018, revealing customer data and account PINs. While…
FBI officials have released an official statement that they have seized the servers operating in United States, Ukraine and France…
May 03, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems…
AvosLocker ransomware group has claimed the Bluefield University ransomware attack, hijacking the university’s mass alert system to display its own…
New Android spyware, BouldSpy detected recently by Lookout Threat Lab, linked with moderate certainty to Iran’s Law Enforcement Command of…
Cyber swindlers, also known as cyber fraudsters, are individuals or groups who use the internet and technology to commit fraud…
Attackers are finding new ways to evade detection and blend in with normal network traffic using HTTP and HTTPS to…
This year has seen a rapid acceleration in the American government’s efforts to secure federal and state cyber infrastructure. This…
As outside economic pressures continue to shape how organizations think and allocate resources, data security continues to be a high…
Not all cybersecurity budgets are made equal, and for some that means having too many or too few tools. For…