TL/DR: Much like Darlene Alderson from Mr Robot, Goonjeta Malhotra entered the hacking battleground and sharpened her chops after taking…
Beware of the latest phishing campaigns that distribute the QBot malware via PDFs and Windows Script Files (WSF) to infiltrate…
My Makefile for building this site, optimizing images, and running my CI/CD GitHub Actions flow. Fun fact: I first launched…
Precisely speaking, the heading is related to two different articles with different stories. The first one goes as follows: According…
As data breaches and cyber attacks continue to rise, the traditional method of securing online accounts using passwords is becoming…
Apr 19, 2023Ravie LakshmananSandbox / Software Security A fresh round of patches has been made available for the vm2 JavaScript…
When I joined HackerOne last year, the vitality of the hacker community drew me to this organization. And as Chief…
As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger…
On April 26 and 27, Las Vegas Convention Center will become home to the ultimate exhibition for the customer engagement…
TL/DR: Gender inequality and the lack of women is ubiquitous in tech companies – more so in cybersecurity. While it…
The Chinese-based Video surveillance equipment manufacturer has disclosed a critical flaw in their storage products, allowing threat actors to obtain…
Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of…