It’s the World Data Backup Day. We have completely swapped the physical storage of documents with soft copies to store…
This is another bug that was right in front of everyone because if you didn’t purposely look for it you’d…
Anyone who pays attention on April Fool’s Day has learned to think twice about the information they read, the links…
If you are a software supplier and your customer is covered by the EU NIS2 directive, you might very well…
OSC&R (Open Software Supply Chain Attack Reference) is an open framework for understanding and evaluating software supply chain security threats….
Security researchers detected a new attack vector in Azure Active Directory (AAD) that allowed them to alter the search results…
Proof of concept Are you aware of any (private) bug bounty programs? I would love to get an invite. Please…
ExaTrack found a new undetected implant family called Mélofée that targets Linux systems. Three samples of the previously known malicious…
Only 9% of organizations are taking an agile, holistic and mature approach to securing identities throughout their hybrid and multi-cloud…
I used Google Drawings and there’s no shame in that This is a story about how I (re)discovered an exploitation…
Are you one of those who play games by investing real money to earn double or triple the amount in…
In this Help Net Security interview, Michal Cizek, CEO at GoodAccess, discusses the crucial balance between leveraging distributed resources and…