Hacking
-
Vulnerable APIs and Bot Attacks Costing Businesses Up to $186 Billion Annually
Organizations are losing between $94 – $186 billion annually to vulnerable or insecure APIs (Application Programming Interfaces) and automated abuse…
Read More » -
The key considerations for cyber insurance: A pragmatic approach
Business Security Would a more robust cybersecurity posture impact premium costs? Does the policy offer legal cover? These are some…
Read More » -
Hack My Career: Meet Bertijn Eldering
Bertijn’s story is a great example of how passion, curiosity, and determination can open doors. From navigating the challenges of…
Read More » -
Shell Command Obfuscation To Avoid Detection Systems
Shell command obfuscation to avoid SIEM/detection system During pentest, an important aspect is to be stealth. For this reason you…
Read More » -
New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking
Oct 03, 2024Ravie LakshmananLinux / Malware Misconfigured and vulnerable Linux servers are the target of an ongoing campaign that delivers…
Read More » -
The complexities of cyberattack attribution – Week in security with Tony Anscombe
Video As highlighted by new ESET research this week, attributing a cyberattack to a specific threat actor is a complex…
Read More » -
Retail Under Attack: 6 Learnings from a Retail Customer
1. Retail and E-commerce Are Prone to Credential-based Attacks “Credential-based attacks are evergreen.” When asked what significant security threats are…
Read More » -
A Proof-Of-Concept Cobalt Strike Reflective Loader Which Aims To Recreate, Integrate, And Enhance Cobalt Strike’s Evasion Features!
A proof-of-concept User-Defined Reflective Loader (UDRL) which aims to recreate, integrate, and enhance Cobalt Strike’s evasion features! Contributors: UDRL Usage…
Read More » -
How to Get Going with CTEM When You Don’t Know Where to Start
Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks…
Read More » -
Cybersecurity Awareness Month needs a radical overhaul – it needs legislation
Digital Security Despite their benefits, awareness campaigns alone are not enough to encourage widespread adoption of cybersecurity best practices 01…
Read More »