How to optimize your bug bounty programs
In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role...
Read more →In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role...
Read more →Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it...
Read more →A Western Australian man has been sentenced to two years in prison after fraudulently using stolen credentials from dark web...
Read more →Several Victorian councils are working to establish their exposure after an after-hours call centre operator was breached. The provider, OracleCMS,...
Read more →I see a lot of people who want to work in cybersecurity. I said the same when I got started,...
Read more →X has flouted orders to remove footage of a stabbing at a church in Sydney’s south west last week, saying...
Read more →Powerlink Queensland is offering staff access to M365 Copilot upon request and then on a ‘use it or lose it’...
Read more →Chinese government-linked hackers have burrowed into US critical infrastructure and are waiting “for just the right moment to deal a...
Read more →Akira ransomware received $42M in ransom payments from over 250 victims Pierluigi Paganini April 21, 2024 Government agencies revealed that...
Read more →You rarely root for a cybercriminal, but a new malware campaign targeting child exploiters doesn’t make you feel bad for...
Read more →DuneQuixote campaign targets the Middle East with a complex backdoor Pierluigi Paganini April 21, 2024 Threat actors target government entities...
Read more →Ransomware actors have had a rough start this year, as stats from cybersecurity firm Coveware show companies are increasingly refusing...
Read more →