Bug bounty programs can deliver significant benefits, but only if you’re ready
Bug bounty programs, which offer financial incentives to outside security researchers to find software vulnerabilities, seem […]
Salt Typhoon poses a serious supply chain risk to most organizations
In the late spring of 2024, the US Federal Bureau of Investigation (FBI) began investigating reports […]
US sanctions Chinese cybersecurity firm over global malware campaign
The US government has imposed sanctions on Chinese cybersecurity firm Sichuan Silence Information Technology and one […]
Romanian energy supplier Electrica hit by ransomware
First, the Romanian presidential election was annulled after being targeted with cyberattacks from foreign state-sponsored actors and […]
Black Hat Europe preview: Cryptographic protocol attacks and AI in the spotlight
This week in London Black Hat Europe will feature a diverse range of talks and presentations […]
The Economics of XDR: Reducing Costs and Enhancing Efficiency
As cyber threats get trickier—with ransomware attacks happening every 11 seconds, and each attack costing between […]
Termite-Bande bekennt sich zu Blue Yonder-Hack
Die Ransomware-Bande Termite ist offenbar für den Hackerangriff auf den SaaS-Anbieter Blue Yonder verantwortlich. DC Studio […]
AWS customers face massive breach amid alleged ShinyHunters regroup
Terabytes of data belonging to thousands of AWS customers, including customer details, AWS credentials, and proprietary […]
Zukunft schenken und die Hacker School unterstützen
Mitmachen und Zukunft schenken. In einer Zeit, in der IT-Technik und digitale Tools alle Facetten unseres […]
Top tips for CISOs running red teams
Red team is the de facto standard in offensive security testing when you want to know […]