Announcing the PlayStation Bug Bounty Program
This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s blog. At PlayStation, we are…
This guest post is authored by Geoff Norton, Senior Director Software Engineering at PlayStation, and was originally published on PlayStation’s blog. At PlayStation, we are…
May 06, 2023Ravie LakshmananAdvanced Persistent Threat An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to…
Founded in 1827, KTH Royal Institute of Technology in Stockholm is one of Sweden’s leading universities. Niklas Olsson, IT Solution Manager at KTH, and his…
What are Penetration Tests? Penetration testing is one of the most widely used techniques for complying with security regulations and protecting networks, computing systems, and…
We have recently released Out-of-band Exploitation Support, a new feature that will improve test coverage, the quality of scan results, and allow us to implement…
Satnam Narang, Senior Staff Research Engineer, Security Response, Tenable, recently sat down with The Cyber Express to discuss the future of Artificial Intelligence and cybersecurity.…
June is widely recognized as Pride month –an important moment to pause, celebrate, and support our community, employees and friends in the LGBTQIA+ community. We…
Detectify works with ethical hackers to help put security knowledge into the hands of those who need it most, and make the Internet a safer…
May 06, 2023Ravie Lakshmanan Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security…
Politically motivate group NoName added French government websites to its victim list. The group enlisted the National Center for Space Studies of France. The website…
Congratulations to @mayonaise, the ninth hacker to earn $1 Million hacking for good on the HackerOne platform! Over the past 2 years, @mayonaise has helped…
White-hat hackers are experts at discovering vulnerabilities and they want to help you improve your security. You may never be able to hire them for…