Why Bug-Bounty Programs Are Failing Everyone
July 29 2022In a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a...
Read moreIn a Black Hat USA talk, Katie Moussouris will discuss why bug-bounty programs are failing in their goals, and what needs to happen next to use bounties in a...
Read moreThe first half of the year saw more than 11,800 reported security vulnerabilities, but figuring out which ones to patch first remains a thankless job for IT teams.
Read moreThe new GuardDuty Malware Protection and Amazon Detective were among 10 products and services unveiled at AWS re:Inforce in Boston this week.
Read moreWhy was PII belonging to nearly 1 billion people housed in a single, open database? Why didn't anyone notice it was downloaded?
Read moreThe campaign uses four malicious packages to spread "Volt Stealer" and "Lofy Stealer" malware in the open source npm software package repository.
Read moreTrying to get the whole organization on board with better cybersecurity is much tougher than it may sound.
Read moreTrying to get the whole organization on board with better cybersecurity is much tougher than it may sound.
Read moreAttackers almost immediately leapt on a just-disclosed bug, CVE-2022-26138, affecting Atlassian Confluence, which allows remote, unauthenticated actors unfettered access to Confluence data.
Read moreBy embracing cybersecurity as a critical part of our national security and education strategy, and working together to invest in opportunities for all, we can create a safer, more...
Read more
Recent Comments