Yesterday, hackers on HackerOne hit a major milestone: they have earned a total of $100 million in bounties over the past…
Update: Insecure Deserialization is proposed to move into a new category in the OWASP Top 10 2021 called Software and…
The merciless killing by police of George Floyd laid bare, once again, the institutionalized racism that plagues the USA. It…
What does a black-hat hacker look like? The word probably conjures up a picture of a hoodie-wearing computer genius hacking…
Google and Apple want to create a specification for tech that alerts users when they’re being tracked by AirTags and…
We take a look at trouble brewing in browser land after a controversial Windows update leaves Chrome fans without a…
Black Lives Matter. During this time, I find myself with a mix of emotions that makes it difficult to focus….
By Edward Maule, Chief Information Officer and Chief Information Security Officer at Advocare, LLC Artificial intelligence (AI) has made significant…
By Anurag Gurtu, Chief Product Officer at Strike Ready In 2022, the global average total breach cost surpassed $4.35M, and…
Risto Siilasmaa is a pioneer in IT security and one of Detectify’s early investors. He is well-known for founding the…
Hello hackers! Thanks to all of you who participated in our #h1-2006 CTF! We had a lot of fun building it,…
Insufficient Logging and Monitoring is one of the categories on OWASP‘s Top 10 list and covers the lack of best…










