Global finance firms take part in NATO cyber attack simulation
19
Apr
2023

Global finance firms take part in NATO cyber attack simulation

Global financial services businesses are taking part in an annual NATO cyber security exercise which tests the resilience of critical…

Let’s Celebrate the Hacker Community
19
Apr
2023

Let’s Celebrate the Hacker Community

October is Cybersecurity Awareness Month, but at HackerOne, we’ve decided it should be Hacker Awareness Month. We want to spend…

Naming System for Cybercriminals
19
Apr
2023

Microsoft Uses Weather As Naming System For Cybercriminals

Apart from the unpredictability of occurrences and the certainty of existence, what’s the connection between cyberattacks and weather conditions? That’s…

Top 3 mistakes when implementing an External Attack Surface Management (EASM) program
19
Apr
2023

Top 3 mistakes when implementing an External Attack Surface Management (EASM) program

TLDR: Proactive external attack surface management (EASM) has become increasingly important than ever before as organizations face an expanding threat…

Hackers Using Old Nokia 3310 Phone to Start Car Without Key
19
Apr
2023

Hackers Using Old Nokia 3310 Phone to Start Car Without Key

Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft…

CyberUK 23: Alert over mercenary Russian threat to CNI
19
Apr
2023

CyberUK 23: Alert over mercenary Russian threat to CNI

On the opening morning of its CyberUK conference in Belfast, the UK’s National Cyber Security Centre (NCSC) has issued an…

Cybercriminals Evade Detection Using Malware Proxy Service
19
Apr
2023

Cybercriminals Evade Detection Using Malware Proxy Service

Security researchers have discovered a new malware proxy service called “Faceless” that is being used by cybercriminals to evade detection…

How to quickly batch resize, compress, and convert images with a Bash one-liner
19
Apr
2023

How to quickly batch resize, compress, and convert images with a Bash one-liner

A fast command line interface solution for batch image processing. Part of my Hugo site continuous deployment workflow is the…

Nokia 3310
19
Apr
2023

Hackers Using Old Nokia 3310 Phone to Steal Cars

The car thieves are employing the out-of-date Nokia 3310 phone to access cars through hacking. This new approach is among…

New Hacker Claims Breach Of 1M Indonesians
19
Apr
2023

New Hacker Claims Breach Of 1M Indonesians

A threat actor that goes by the name of Anonymous India has claimed to have breached the data of 1…

QlikWorld 2023: Capone asserts expanded economic mission for data analytics
19
Apr
2023

QlikWorld 2023: Capone asserts expanded economic mission for data analytics

Mike Capone, CEO of data analytics firm Qlik, claimed a broad mission for the supplier’s data integration and visualisation software,…

TikTok Celebrates Two Years of Bug Bounty
19
Apr
2023

TikTok Celebrates Two Years of Bug Bounty

In the last two years of their bug bounty program, the hacker community has helped TikTok identify and disclose 450…