Jun 25, 2024NewsroomWordPress / Web Security Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible…
In a shocking development, the NHS has revealed that it was the victim of a major cyber attack targeting Synnovis….
Zeek is an open-source network analysis framework. Unlike an active security device such as a firewall, Zeek operates on a…
Jun 25, 2024NewsroomCyber Crime / Financial Fraud Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted…
In this Help Net Security interview, Kunal Modasiya, VP of Product Management and Growth at Qualys, explores the key features,…
We have a collective unaddressed weakness when it comes to basic cybersecurity. Out of the many reports circulating in the…
Last week’s ransomware attack on software as a service (SaaS) provider CDK Global has had a ripple effect on its…
A recently discovered vulnerability (CVE-2024-27812) in the Apple Vision Pro headset allowed hackers to bypass device security mechanisms and flood…
US auto dealers continue to grapple with an ongoing cyber attack-led software outage, with some reverting to manual paperwork as…
A cyber attacker compromised Indonesia’s national data centre, disrupting immigration checks at airports, and asked for a US$8 million ($12…
NAB is steadily reducing its reliance on overnight batch processes to get data from source systems into a central data…
In the following interview, Jessica discusses how she embodies HackerOne’s Win as a Team company value to drive her team’s…











