Microsoft highlights Zero Trust Approach
14
Mar
2023

Microsoft highlights Zero Trust Approach

14 March, 2023; Dubai, United Arab Emirates – Microsoft today brought a message of collaboration and resilience to GISEC 2023,…

Learn to build it, then break it
14
Mar
2023

Learn to build it, then break it

A good friend of mine and successful bug bounty hunter, Corben Leo, discussed in a blog post how he spotted…

Google Search Ads to Deliver malware
14
Mar
2023

Hackers Abuse Google Search Ads to Deliver Malware

Recently, the cybersecurity researchers at eSentire have identified a shady piece of malware downloader, BatLoader, that has been engaged in…

14
Mar
2023

Security in the cloud with more automation

Hopefully, you’ve been working with the Center for Internet Security (CIS) on securing your cloud infrastructure for a while now….

Amazon Ring Data Breach
14
Mar
2023

Amazon Ring Data Breach, ALPHV Ransomware Claims Attack

Ring, a popular home security company, has allegedly been the target of a data breach by the ALPHV ransomware group….

Subdomain reconnaissance: enhancing a hacker's EASM
14
Mar
2023

Subdomain reconnaissance: enhancing a hacker’s EASM

External Attack Surface Management (EASM) is the continuous discovery, analysis, and monitoring of an organization’s public facing assets. A substantial…

Kali Linux 2023.1 Released With Tools for Blue and Purple Teams
14
Mar
2023

Kali Linux 2023.1 Released With Tools for Blue and Purple Teams

Offensive security released Kali Linux 2023.1 with new tools for purple and blue teamers for defensive security. On March 13th…

14
Mar
2023

Product showcase: Permit.io – Application-level permissions with a no-code UI

Managing user access in applications has always been a headache for any developer. Implementing policies and enforcing them can prove…

Fortinet FortiOS
14
Mar
2023

Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities

Mar 14, 2023Ravie LakshmananNetwork Security / Cyber Attack Government entities and large organizations have been targeted by an unknown threat…

How Detectify uses DAST in its EASM platform
14
Mar
2023

How Detectify uses DAST in its EASM platform

There’s often a lack of understanding when it comes to DAST as a methodology versus DAST as a tool. How…

Cyber Attack news headlines trending on Google
14
Mar
2023

Cyber Attack news headlines trending on Google

For the past 1 year or so, a museum is unable to access its artecraft database because of a ransomware…

14
Mar
2023

We can’t wait for SBOMs to be demanded by regulation

Old ads can be startling—cigarette ads used to boast their health-giving properties, sugar-laden candy was once advertised as a dietary…