Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization's Attack Resistance Gap
24
Apr
2023

Announcing the HackerOne 2022 Attack Resistance Report: A Security Survey—How to Close Your Organization’s Attack Resistance Gap

Today, HackerOne published The 2022 Attack Resistance Report: A HackerOne Security Survey. Our research revealed an increasing gap—the attack resistance…

PaperCut
24
Apr
2023

Exploit released for PaperCut flaw abused to hijack servers, patch now

Attackers are exploiting severe vulnerabilities in the widely-used PaperCut MF/NG print management software to install Atera remote management software to…

Don't let manual processes hold you back, automate your AppSec
24
Apr
2023

Don’t let manual processes hold you back, automate your AppSec

At RSA Conference 2023, the key theme for Mend is automation. Their focus is on helping people put their application…

Detectify honored as the market leader in Attack Surface Management in Global InfoSec Awards
24
Apr
2023

Detectify honored in Global InfoSec Awards 2023

Detectify is honored to start off the RSA 2023 Conference with the news that it has been recognized as the…

Kucoin
24
Apr
2023

KuCoin’s Twitter account hacked to promote crypto scam

KuCoin’s Twitter account was hacked, allowing attackers to promote a fake giveaway scam that led to the theft of over…

Securing the Edge Ecosystem Global Research released – Complimentary report available
24
Apr
2023

Securing the Edge Ecosystem Global Research released – Complimentary report available

[ This article was originally published here ] AT&T Cybersecurity is committed to providing thought leadership to help you strategically…

Most IT staff uncomfortable deploying surveillance tech at work
24
Apr
2023

Most IT staff uncomfortable deploying surveillance tech at work

Corporate IT teams have expressed discomfort towards the use of employee surveillance technologies at work, with both workers and managers…

SSD with in-built ransomware prevention capabilities
24
Apr
2023

SSD with in-built ransomware prevention capabilities

Can you imagine Hard Disk Drives (HDD) and Solid-State Disks (SSD) being immune to ransomware attacks? Well, a company named…

Flashpoint Ignite accelerates cross-functional risk mitigation and prevention
24
Apr
2023

Flashpoint Ignite accelerates cross-functional risk mitigation and prevention

Flashpoint has released Ignite, a new intelligence platform that accelerates cross-functional risk mitigation and prevention across CTI, vulnerability management, national…

Ransomware Hackers
24
Apr
2023

Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack

Apr 24, 2023Ravie LakshmananEndpoint Security / BYOVD Threat actors are employing a previously undocumented “defense evasion tool” dubbed AuKill that’s…

How Wix Improves Their Security Posture with Ethical Hackers
24
Apr
2023

How Wix Improves Their Security Posture with Ethical Hackers

Reducing risk is fundamental to Wix’s approach to cybersecurity, and as the threat landscape evolves, they turn to HackerOne Bounty…

APC UPS in a server rack
24
Apr
2023

APC warns of critical unauthenticated RCE flaws in UPS software

APC’s Easy UPS Online Monitoring Software is vulnerable to unauthenticated arbitrary remote code execution, allowing hackers to take over devices…