Latest Articles

Bugcrowd University: The free educational platform for security researchers

Bugcrowd University: The free educational platform for security researchers

Bugcrowd University: The free educational platform for security researchers

The Bugcrowd crowdsourcing platform launched Bugcrowd University, an educational platform for security researchers that aims to contribute to the development of bug hunting skills

Juan Manuel Harán24 Aug 2018


Video

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Video

Week in security with Tony Anscombe

Shane Curtis24 Aug 2018


Cybercrime

Superdrug targeted by miscreants who claim to have stolen customer data

Superdrug targeted by miscreants who claim to have stolen customer data

Cybercrime

Superdrug targeted by miscreants who claim to have stolen customer data

The retailer says that whatever data the crooks have obtained, they weren’t stolen through a breach of its systems

Tomáš Foltýn23 Aug 2018


ESET Research

Turla: In and out of its unique Outlook backdoor

Turla: In and out of its unique Outlook backdoor

ESET Research

Turla: In and out of its unique Outlook backdoor

ESET research offers a rare glimpse into the mechanics of a particularly stealthy and resilient backdoor that the Turla cyberespionage group can fully control via PDF files attached to emails

Tomáš Foltýn22 Aug 2018


Internet of Things

Smart irrigation systems vulnerable to attacks, warn researchers

Smart irrigation systems vulnerable to attacks, warn researchers

Internet of Things

Smart irrigation systems vulnerable to attacks, warn researchers

Internet-connected irrigation systems suffer from security gaps that could be exploited by attackers aiming, for example, to deplete a city’s water reserves, researchers warn

Tomáš Foltýn21 Aug 2018


Digital Security

A heated summer for cybersecurity in Canada

A heated summer for cybersecurity in Canada

Digital Security

A heated summer for cybersecurity in Canada

An overview of some of the cyberattacks that Canadian organizations faced in the summer months of 2018

Gabrielle Ladouceur Despins20 Aug 2018


Digital Security

Australian schoolboy hacks into Apple’s network, steals files

Australian schoolboy hacks into Apple’s network, steals files

Digital Security

Australian schoolboy hacks into Apple’s network, steals files

His lawyer claims that the teen did the hacking because he admired Apple and dreamed of landing a job in the company

Tomáš Foltýn17 Aug 2018


Digital Security

Week in security with Tony Anscombe

Week in security with Tony Anscombe

Digital Security

Week in security with Tony Anscombe

The first week in security video round-up from WeLiveSecurity

Shane Curtis17 Aug 2018


Some 2.6 billion data records exposed in first half of 2018

Some 2.6 billion data records exposed in first half of 2018

Some 2.6 billion data records exposed in first half of 2018

The newly-released report provides an overview of the data breach landscape in the first half of this year

Tomáš Foltýn16 Aug 2018


Digital Security

Instagram users locked out of accounts en masse

Instagram users locked out of accounts en masse

Digital Security

Instagram users locked out of accounts en masse

If you’re an Instagrammer, you may want to take some basic precautions, such as picking a strong and unique password and signing up for two-factor authentication sooner rather than later

Tomáš Foltýn15 Aug 2018


Digital Security

Black Hat 2018: AI was supposed to fix security – what happened?

Black Hat 2018: AI was supposed to fix security – what happened?

Digital Security

Black Hat 2018: AI was supposed to fix security – what happened?

Heralded as the answer to many cybersecurity issues, machine learning hasn’t always delivered

Cameron Camp14 Aug 2018


Secure Coding

Can cramming code with bugs make it more secure? Some think so

Can cramming code with bugs make it more secure? Some think so

Secure Coding

Can cramming code with bugs make it more secure? Some think so

Unbeknownst to exploit writers, the seemingly mouth-watering bugs would be bogus and non-exploitable

Tomáš Foltýn13 Aug 2018


Apt Activity Report
MDR Protection