Weaponized WinSCP & PuTTY
15
May
2024

New Social Engineering Attack That Delivers Black Basta Ransomware

Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social…

Google blocks millions of apps from Playstore for Mobile Security
15
May
2024

Strategies for Achieving Security Success in Mobile Application Management

In today’s digital era, where mobile devices play an integral role in both personal and professional lives, effective Mobile Application…

Ransomware statistics that reveal alarming rate of cyber extortion
15
May
2024

Ransomware statistics that reveal alarming rate of cyber extortion

In this article, you will find excerpts from various reports that offer statistics and insights about the current ransomware landscape….

Frotcom Data Breach
15
May
2024

Dark Web Hacker “DuckyMummy” Alleges Frotcom Data Breach

A dark web actor named DuckyMummy claimed responsibility for an alleged data breach at Frotcom International, a prominent player in…

Hackerone logo
15
May
2024

A Guide to Get the Most Out of Your One-on-ones

Before we dive into the tips and strategies for different types of 1:1s (e.g. 1:1s with your manager, your peers,…

Core security measures to strengthen privacy and data protection programs
15
May
2024

Core security measures to strengthen privacy and data protection programs

As privacy laws evolve globally, organizations face increasing complexity in adapting their data protection strategies to stay compliant. In this…

Cybersecurity jobs available right now: May 15, 2024
15
May
2024

Cybersecurity jobs available right now: May 15, 2024

Associate / Pentester (Red Team) – Cybersecurity Audit Siemens | Germany | Hybrid – View job details As an Associate…

Hackerone logo
15
May
2024

Building Bridges: The Art of Effective Communication Across Teams

At HackerOne, we believe that the better we are aligned, the better we know where to go, and the more…

Zscaler Test Servers Compromised
15
May
2024

Attacker Steals Customer Phone Numbers

In a concerning development for Dell Technologies, a threat actor known as Menelik has reportedly accessed and scraped sensitive customer…

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors
15
May
2024

Cybersecurity analysis exposes high-risk assets in power and healthcare sectors

Traditional approaches to vulnerability management result in a narrow focus of the enterprise attack surface area that overlooks a considerable…

15
May
2024

Open XDR can help combat the cyber skills shortage and cyber burn out – Partner Content – State of Security 2024

For all organisations, managing cybersecurity threats and risks is both an upstream and downstream challenge. Just as a village at…

Hackerone logo
15
May
2024

On Listening | HackerOne

Good listening is an act of empathy and curiosity. Empathy is understanding how others feel, what their world looks like,…