Navigating the quantum leap in cybersecurity
In this Help Net Security interview, we sit down with Dr. Atsushi Yamada, the newly appointed CEO of ISARA, a security solutions company specializing in…
In this Help Net Security interview, we sit down with Dr. Atsushi Yamada, the newly appointed CEO of ISARA, a security solutions company specializing in…
Legal and compliance leaders should address their organization’s exposure to six specific ChatGPT risks, and what guardrails to establish to ensure responsible enterprise use of…
Ads containing the official website of an impersonated brand are running again, allowing fraudsters to scam users. Web search is about to embark on a…
After 1 month of our community’s best and brightest going head to head to be named Hack The World 2017 champion, we are ready to…
Apple issued information about patches against three actively exploited zero-days in WebKit. One vulnerability is new, two were patched earlier this month. Apple has rolled…
As of today, researchers can report security issues in Detectify services to earn a spot on our Hall of Fame as well as some cool…
We take a look at a case where Google is agreeing to pay $40m as a result of disclosure related to location tracking issues. Google…
Mandiant researchers recently identified “URL Schema Obfuscation” as an adversary technique that conceals the final URL destination by manipulating the URL schema during the distribution…
CERT-UA has identified and addressed a cyber attack on the government information systems of Ukrainian governmental state bodies. Through investigation, it was discovered that the…
An employee that tried to take advantage of a ransomware attack on his own company has pleaded guilty after 5 years of denying he had…
“Hacking the U.S. Government” was the first panel discussion at Security@ SF, and it proved to be as interesting as you would expect. Jeff John…
We take a look at a viral hoax on Twitter which used AI generated imagery to claim an explosion had occurred close to the Pentagon.…