Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!
01
Jun
2023

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to…

CYTRACOM improves efficiency for MSPs with ControlOne platform updates
01
Jun
2023

CYTRACOM improves efficiency for MSPs with ControlOne platform updates

CYTRACOM announces a significant update to its ControlOne platform, enabling MSPs to prevent managed clients from evading security requirements and…

What to Look For in a Penetration Testing Company
01
Jun
2023

Where’s that Security@? | HackerOne

All technology contains bugs. These bugs frequently have security implications that may be exploited by criminals, but are more often…

Hacker looking at infected devices
01
Jun
2023

New MOVEit Transfer zero-day mass-exploited in data theft attacks

Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit…

Dating Apps And Sites: Mitigating Chargebacks In 2023
01
Jun
2023

How Do ‘Nigerian Prince’ And Other Online Scams Hoodwink Us?

The recent sentencing of two Nigerian nationals, Soloman Ekunke Okpe and Johnson Uke Obogo, yet again has drawn attention to…

Met Police director of intelligence defends facial recognition
01
Jun
2023

Met Police director of intelligence defends facial recognition

The Metropolitan Police Services’ (MPS) director of intelligence has defended the force’s use of facial-recognition technology to a Parliamentary committee,…

Dating Apps And Sites: Mitigating Chargebacks In 2023
01
Jun
2023

FTC Imposes 30M Penalties On Amazon Ring, Alexa Privacy Row

Amazon has agreed to pay a fine of $25 million to settle allegations made by the US Federal Trade Commission…

Hackerone logo
01
Jun
2023

Improving Signal Over 10,000 Bugs

On July 2nd, 2015, HackerOne reached 10,000 valid security vulnerabilities resolved on our platform – that’s 10,000 fewer ways for…

Cyber Security Resilience
01
Jun
2023

How Wazuh Improves IT Hygiene for Cyber Security Resilience

IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running…

AI interview: Dan McQuillan, critical computing expert
01
Jun
2023

AI interview: Dan McQuillan, critical computing expert

The ways that artificial intelligence (AI) will impact upon our lives are being determined by governments and corporations, with little…

Threat actors can exfiltrate data from Google Drive without leaving a trace
01
Jun
2023

Threat actors can exfiltrate data from Google Drive without leaving a trace

Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive…

Malicious PyPI Packages
01
Jun
2023

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

Jun 01, 2023Ravie LakshmananProgramming / Supply Chain Researchers have discovered a novel attack on the Python Package Index (PyPI) repository…