In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features,…
We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the…
Last week’s ransomware attack on software as a service (SaaS) provider CDK Global has had a ripple effect on its…
A recently discovered vulnerability (CVE-2024-27812) in the Apple Vision Pro headset allowed hackers to bypass device security mechanisms and flood…
US auto dealers continue to grapple with an ongoing cyber attack-led software outage, with some reverting to manual paperwork as…
A cyber attacker compromised Indonesia’s national data centre, disrupting immigration checks at airports, and asked for a US$8 million ($12…
NAB is steadily reducing its reliance on overnight batch processes to get data from source systems into a central data…
In the following interview, Jessica discusses how she embodies HackerOne’s Win as a Team company value to drive her team’s…
CISA is warning that its Chemical Security Assessment Tool (CSAT) environment was breached in January after hackers deployed a webshell…
St Vincent’s Health Australia (SVHA) is seeking a chief technology officer to lead its “technology roadmap and investment plan”. Michelle…
Google is testing a new feature called “Digital Credential API” for Chrome on Android that allows websites to securely request identity…
A ransomware attack on Indonesia’s national data center has disrupted official government services. The attack has reportedly affected more than…











