Outpost24 Acquires EASM Provider Sweepatic
Cybersecurity risk management specialists Outpost24 have today announced the acquisition of Sweepatic. Based in Leuven, Belgium, Sweepatic is an innovative external attack surface management (EASM)…
Cybersecurity risk management specialists Outpost24 have today announced the acquisition of Sweepatic. Based in Leuven, Belgium, Sweepatic is an innovative external attack surface management (EASM)…
The idea for the UT-Austin project emerged from discussions in CISA’s Cybersecurity Advisory Committee, a group of experts from the private sector, academia, civil society,…
Gal Helemski, Co-Founder & CTO/CPO of Many lessons can be learned when reflecting on 2022’s slew of data breaches. As we understand more about data…
Prism Infosec has identified two high-risk vulnerabilities within the Aspect Control Engine building management system (BMS) developed by ABB. ABB’s Aspect BMS enables users to…
The government is funding tests of satellite, wireless and fixed line broadband in rural areas in an attempt to grow rural economies. A £7m fund…
By CW Walker, Director, Security Product Strategy at SpyCloud The first three quarters of 2022 saw the total detection of over 62.29 million new types of malware…
By Noah Johnson, Co-Founder & CTO of Dasera In today’s digital age, data is the lifeblood of business growth. With large amounts of data sprawled…
The hacktivist group Anonymous Sudan has claimed to attack the website of the American artificial intelligence company OpenAI. According to their post, the OpenAI cyber…
During the recent Worldwide Developers Conference (WWDC), Apple Inc. unveiled a range of new privacy and security features designed to enhance user protection. One notable…
Zero Trust is an emerging cybersecurity framework that challenges the traditional perimeter-based security model. In the enterprise cyber world, where the threat landscape is constantly…
Researchers have recently discovered a concerning trend in Vietnam where individuals are falling victim to fraudulent apps. These malicious applications are equipped with a new…
In my last post I discussed how developers can be your security secret weapon… but how to help them love doing security work? That’s a…