2022 Year-End API ThreatStats™ Report
In 2022, the Wallarm Threat Research team went through almost 350,000 reports to find 650 API-specific vulnerabilities, and tracked 115 published exploits impacting these vulnerabilities…
In 2022, the Wallarm Threat Research team went through almost 350,000 reports to find 650 API-specific vulnerabilities, and tracked 115 published exploits impacting these vulnerabilities…
A suspected Chinese hacking group has been linked to a series of attacks on government organizations exploiting a Fortinet zero-day vulnerability (CVE-2022-41328) to deploy malware.…
A new decryption tool that aids victims of a ransomware version that was based on previously released Conti source code has been published. Ransomware gangs like…
By Joshua Parsons, Product Marketing Manager, Enzoic With data breaches commonplace and passwords often found to be the root cause, security teams are seeking password…
Career and Community building with Bug Bounties | NahamCon Panel Source link
The BianLian ransomware group has shifted its focus from encrypting its victims’ files to only exfiltrating data found on compromised networks and using them for…
By Ofer Klein, CEO and co-founder, Reco Recent research found that 96% of business leaders believe that effective communication is key to a productive remote…
By PJ Rohall, Head of Fraud Strategy & Education – SEON It can be upsetting when you try to purchase a ticket for an event…
Networking Fundamentals Source link
Project Zero, Google’s zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets used in mobile devices, wearables, and cars. The Exynos…
Hey there, I hope you’ve been doing well! Pi Day In case you weren’t familiar, March 14th (3.14) was National Pi Day. I celebrated with…
Android malware ‘FakeCalls’ is circulating again in South Korea, imitating phone calls for over 20 financial organizations and attempting to fool bankers into giving away…