How Pwn2Own Made Bug Hunting a Real Sport
May 18 2022From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.
Read moreFrom a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.
Read morePolygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.
Read morePublicly released proof-of-concept exploits are supercharging attacks against unpatched systems, CISA warns.
Read moreBuild security in up front to secure open source code at the foundational level. Apply security controls, have engineering teams test, do code review, and use attacker-centric behavioral analytics...
Read moreSome of more tech-savvy Democrats in the U.S. Senate are asking the Federal Trade Commission (FTC) to investigate identity-proofing company ID.me for "deceptive statements" the company and its founder...
Read moreAttackers appear to have found a way around PowerShell monitoring by using a default utility instead.
Read moreIt has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with zero-trust network access.
Read moreAs demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.
Read moreAs demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.
Read moreWhat's better? Disclose early, patch fast? Or dig deep, disclose in full, patch more slowly?
Read more
Recent Comments