SOC Training is one of the most critical concerns in building a Quality Security Operation Center Team to fight against…
HTTP request smuggling is increasingly exploited by hackers in the wild and in bug bounty programs. This post will explain…
The U.S. Cybersecurity Infrastructure Security Agency (CISA) and the FDA have issued an urgent alert about two vulnerabilities that impact…
Apr 28, 2023Ravie LakshmananNetwork Security / Vulnerability Networking equipment maker Zyxel has released patches for a critical security flaw in…
Today HackerOne announced new capabilities for AWS customers looking to improve security in their cloud applications. These include vulnerability pentests…
Mark your calendar for mWISE™, a global gathering where security’s top practitioners come together to tackle the industry’s biggest challenges….
Stopping new and evasive threats is one of the greatest challenges in cybersecurity. This is among the biggest reasons why…
Federal Bank Cyber Attack and Indian Bank Cyber Attack: Reports have surfaced that a notorious hacking group, the “Mysterious Silent…
For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and…
Apr 28, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Threat actors are advertising a new information stealer for the Apple macOS operating…
The RTM Locker ransomware gang has been discovered to utilize a Linux encryptor that focuses explicitly on virtual machines on…
Apr 28, 2023Ravie LakshmananData Security / Malware A significant number of victims in the consumer and enterprise sectors located across…