Hacking
-
Security Page Updates: Boosting Consistency & Transparency for Security Researchers and Customers
Cross-Directional Consistency & Transparency on the HackerOne Platform HackerOne is a marketplace through which organizations can address security vulnerabilities with…
Read More » -
North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data
Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage North Korean information technology (IT) workers who obtain employment under false identities…
Read More » -
NGate Android malware relays NFC traffic to steal cash
ESET researchers uncovered a crimeware campaign that targeted clients of three Czech banks. The malware used, which we have named…
Read More » -
Tips for Parents Working from Home from HackerOne Employees
At HackerOne, we’ve witnessed our parents craft impressive solutions to blend their professional and personal worlds. We wanted to hear…
Read More » -
Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser
Oct 18, 2024Ravie LakshmananThreat Intelligence / Browser Security Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency,…
Read More » -
Guarding against grooming | Unlocked 403 cybersecurity podcast (ep. 7)
Video, Kids Online “Hey, wanna chat?” This innocent phrase can take on a sinister meaning when it comes from an…
Read More » -
Measure Your AI Risk Preparedness with This Interactive Self-Assessment Tool
Effectively managing these risks requires human expertise and strategic oversight. That’s where the AI Risk Readiness Self-Assessment Tool comes in —…
Read More » -
5 Ways to Reduce SaaS Security Risks
As technology adoption has shifted to be employee-led, just in time, and from any location or device, IT and security…
Read More » -
PWA phishing on Android and iOS – Week in security with Tony Anscombe
Video Phishing using PWAs? ESET Research’s latest discovery might just ruin some users’ assumptions about their preferred platform’s security 23…
Read More » -
European Council Adopts Cyber Resilience Act
The CRA will be a game-changing regulation for software and connected product security. The CRA imposes cybersecurity requirements for manufacturers…
Read More »