Enhancing your application security program with continuous monitoring
Pen Testing as a Service and Traditional web application pen testing offers two different approaches to securing your applications. Learn…
Pen Testing as a Service and Traditional web application pen testing offers two different approaches to securing your applications. Learn…
Russian hacktivist attacks are mostly for show, but sometimes they cause serious damage and are poised to begin getting worse.
Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in…
Venture Capital Firms and Acquiring Companies: The Blind Spot By Kaustubh Medhe, VP, Research & Threat Intelligence Mergers and Acquisitions…
Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users…
This week has been a busy ransomware week, with ransomware attacks having a massive impact on organizations and the fallout…
Sebastien Raoult, a 22-year-old from France, has pleaded guilty in the U.S. District Court of Seattle to conspiracy to commit…
The North Korean 'Lazarus' hacking group targeted employees of an aerospace company located in Spain with fake job opportunities to…
CISA announces it will furlough more than 80% of staff indefinitely if Congress can't reach an agreement to fund the…
Chinese hackers stole tens of thousands of emails from U.S. State Department accounts after breaching Microsoft's cloud-based Exchange email platform…