CYBER SECURITY
-
Lessons from HackerOne’s First Recharge Week
Our first-ever Recharge Week – July 1–5, 2024—aimed at giving most company employees a simultaneous week off to rest, pursue…
Read More » -
Microsoft geht jetzt unter die Phish-Fänger
Den Honig aktiv einsetzen Im Gegensatz zu herkömmlichen Honeypots, die darauf warten, entdeckt zu werden, verfolgt Bevingtons Ansatz das Ziel,…
Read More » -
U.S. Charges Two Sudanese Brothers for Record 35,000 DDoS Attacks
Federal prosecutors in the U.S. have charged two Sudanese brothers with running a distributed denial-of-service (DDoS) botnet for hire that…
Read More » -
Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers
Oct 21, 2024Ravie LakshmananEncryption / Data Protection Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud…
Read More » -
Be careful what you pwish for – Phishing in PWA applications
In this blogpost we discuss an uncommon type of phishing campaign targeting mobile users and analyze a case that we…
Read More » -
Schutz vor Business E-Mail Compromise: 8 wichtige Punkte für Ihre BEC-Richtlinie
Diese Aktualisierungen dienen nicht nur dazu, die Bedrohung in Erinnerung zu rufen und zu verdeutlichen, wie ein BEC-Angriff in den…
Read More » -
How a GraphQL Bug Resulted in Authentication Bypass
What Is an Authentication Bypass Vulnerability? An authentication bypass vulnerability is a weakness in a system that fails to protect…
Read More » -
SideWinder APT Strikes Middle East and Africa With Stealthy Multi-Stage Attack
An advanced persistent threat (APT) actor with suspected ties to India has sprung forth with a flurry of attacks against…
Read More » -
Microsoft Fixed 100+ Vulnerabilities With October Patch Tuesday
42 Microsoft addressed crossed the century of vulnerability fixes, making it one of the huge update bundles released this year.…
Read More » -
EU’s NIS2 Directive for cybersecurity resilience enters full enforcement
Bharat Mistry, technical director for UK and Ireland at Trend Micro, said: “Becoming NIS2-compliant is a significant undertaking that requires…
Read More »