DHS employees jailed for stealing data of 200K U.S. govt workers
Three former Department of Homeland Security (DHS) employees were sentenced to prison for stealing proprietary U.S. government software and databases containing the personal data of…
Three former Department of Homeland Security (DHS) employees were sentenced to prison for stealing proprietary U.S. government software and databases containing the personal data of…
A hacking group affiliated with the Ukrainian government, known as BO Team, has asserted responsibility for the erasure of data from more than 280 servers…
Jan 29, 2024NewsroomVulnerability / NTML Security A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager (NTLM)…
The concepts of technology startups and angel investment are often mentioned hand-in-hand, with the innovation landscape dominated by entrepreneurs pitching ideas on how to use…
NSA buys internet browsing records from data brokers without a warrant Pierluigi Paganini January 29, 2024 The U.S. National Security Agency (NSA) admitted to buying…
The Wallarm Security Research team is pleased to share the latest version of our API ThreatStats report. This report serves as a key resource for…
For as long as digital systems have exerted control over physical machines and their output, the need, and associated questions in how to proportionately secure…
Jenkins has been discovered with a critical vulnerability that is associated with arbitrary code execution that threat actors can exploit for malicious purposes. The vulnerability…
Jan 29, 2024The Hacker NewsSaaS Security / Webinar In today’s digital world, security risks are more prevalent than ever, especially when it comes to Software…
Thanks to the availability of popular generative artificial intelligence (GenAI) software, such as Copilot in the Microsoft Office suite, almost anyone can start using public…
On January 12, 2024, Microsoft identified a nation-state threat actor, “Midnight Blizzard,” attacking their corporate systems. Upon discovery, Microsoft deployed its incident response process to…
Over the last four years, The Most Inspiring Women in Cyber Awards have celebrated some of most inspirational women from across the cybersecurity industry. From…