06
May
2023

France Space Center Attacked! NoName Targets French Government

Politically motivate group NoName added French government websites to its victim list. The group enlisted the National Center for Space…

Mayonaise Joins The Ranks of The Seven-Figure-Earning Hackers
06
May
2023

Mayonaise Joins The Ranks of The Seven-Figure-Earning Hackers

Congratulations to @mayonaise, the ninth hacker to earn $1 Million hacking for good on the HackerOne platform!  Over the past…

3 ways white-hat hackers can help you protect your website
06
May
2023

3 ways white-hat hackers can help you protect your website

White-hat hackers are experts at discovering vulnerabilities and they want to help you improve your security. You may never be…

Newspaper evades Russian censors, hides news in Counter-Strike map
06
May
2023

Newspaper evades Russian censors, hides news in Counter-Strike map

We take a look at one newspaper’s innovative way of bypassing Russian media restrictions. A Finnish newspaper is making clever…

Apple releases first Rapid Security Response update for iOS, iPadOS, and macOS users
06
May
2023

Apple releases first Rapid Security Response update for iOS, iPadOS, and macOS users

After announcing Rapid Security Response (RSR) last year, Apple has finally released the first RSR patches to the public. On…

Mail.ru Group pays out over $1 million in bounties
05
May
2023

Mail.ru Group pays out over $1 million in bounties

“It’s not worth building a fence if it can be bypassed just two steps to the side” Mail.ru Group is…

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges
05
May
2023

Hacking Ubuntu 22.04 servers with just 30 lines of code and get easy root privileges

A recent vulnerability in the OverlayFS subsystem of the Linux kernel has been found as CVE-2023-0386, with a CVSS score…

The Rise in SBOM Adoption and How They Can Effectively Improve Software Supply Chain Security Programs
05
May
2023

The Rise in SBOM Adoption and How They Can Effectively Improve Software Supply Chain Security Programs

By Doug Dooley, COO, The software supply chain has become increasingly complex and dynamic with the rise of cloud computing,…

Incident response: detection
05
May
2023

How to build an incident response plan

Hardly a day goes by without news of another hack making the headlines and the hours and days following a…

Z-Library
05
May
2023

Z-Library eBook site disrupted again by FBI domain seizures

The Federal Bureau of Investigation (FBI) continues to disrupt the world’s largest shadow eBook library, Z-Library, by seizing more domains…

Reputation, Signal & Impact Calculation Enhancements
05
May
2023

Reputation, Signal & Impact Calculation Enhancements

We’re pleased to announce some enhancements to how Reputation, Signal, and Impact are calculated. These changes will be applied going…

4 ways your company benefits from investing in web app security
05
May
2023

4 ways your company benefits from investing in web app security

Let’s clear the air first. All websites are hackable. So how often are you conducting a security check on your…