Infamous cybercrime marketplace offers pre-order service for stolen credentials
17
May
2023

Infamous cybercrime marketplace offers pre-order service for stolen credentials

Infostealer malware, which consist of code that infects devices without the user’s knowledge and steals data, remains widely available to…

How Federal Agencies Use Vulnerability Disclosure Policies to Level Up Security
17
May
2023

Your First 90 Days as Security Lead, Part 2: Developing a Plan and Getting to Work

You’ve just been named as your organization’s new head of security. So what do you do first? Read part one…

Joachim Hedenius, KRY: ”Once you get started, you’ll want to use Detectify as much as possible!”
17
May
2023

Joachim Hedenius, KRY: ”Once you get started, you’ll want to use Detectify as much as possible!”

KRY is undoubtedly one of Sweden’s most successful and talked-about startups. The company offers video consultations with licensed doctors through…

Security by the People: Announcing HackerOne’s FedRAMP Authorization
17
May
2023

AppSec – 5 Tips For A Superb Testing Strategy

Applications have become the lifeblood of businesses in today’s connected world. Software is now the “front door” into your business…

Azure active directory
17
May
2023

Hackers use Azure Serial Console for stealthy access to VMs

A financially motivated cybergang tracked by Mandiant as ‘UNC3944’ is using phishing and SIM swapping attacks to hijack Microsoft Azure…

3 main reasons to use a VPN
17
May
2023

3 main reasons to use a VPN

Most VPN users can be put in one of three categories. It all depends on your needs and your threat…

Web Security Now and Then
17
May
2023

Web Security Now and Then

Web security in 2016 is very different from what it was like in 2006, 1996 or even further back. As…

A confused laptop user
17
May
2023

New ZIP domains spark debate among cybersecurity experts

Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors…

Ransomware shuts down 3 big manufacturing plants in France, Germany and Tunisia
17
May
2023

Ransomware shuts down 3 big manufacturing plants in France, Germany and Tunisia

Lacroix develops and manufactures electronic equipment for the automotive, home automation, aerospace, industrial, and healthcare industries. Lacroix also creates and…

Debt Collection Firm Credit Control Corporation Hit by Major Data Breach
17
May
2023

Debt Collection Firm Credit Control Corporation Hit by Major Data Breach

The magnitude of the data breach is significant, as it has potentially compromised the personal information of 286,699 individuals. Credit…

Confessions of European CISOs | HackerOne
16
May
2023

Open-Xchange Approaches 3 Years of Bug Bounties & 250 Valid Vulnerabilities

The below is a modified version of a blog originally posted by Martin Heiland, Security Officer at web-based communication, collaboration…

A confused laptop user
16
May
2023

New ZIP domains sparks debate among cybersecurity experts

Cybersecurity researchers and IT admins have raised concerns over Google’s new ZIP and MOV Internet domains, warning that threat actors…