Tag "Hacker"

Back to homepage
Hardware/Network

What hackers inside your company are after: Convenience

Digital transformation is not a technology trend. Rather, it is a convenience trend. Businesses are changing because customer expectations demand it. Each day, consumers find yet another use for mobile connectivity.

Software

Hacker AI vs. Enterprise AI: A New Threat

Artificial intelligence and machine learning are being weaponized using the same logic and functionality that legitimate organizations use.The adversarial use of artificial intelligence (AI) and machine learning (ML) in malicious

Software

Meet the new generation of white hats

The past two years have seen an explosion in the number of software vulnerabilities being published, jumping from 6,447 in 2016 to 14,714 in 2017. Seeing as 2018 beat out

Hardware/Network

Hacker behind Collection #1 credential database identified

The threat actor was believed to be working on this breach for over two to three years. Known by the pseudonym ‘C0rpz’, it was hinted that there was more than

Identity Theft

Breach — How To Find Out If Your Password Has Been Stolen

Yesterday, it emerged that a set of over 2.7 billion email addresses and passwords had been posted to a hacking forum for anyone to see in a mega-breach dubbed Collection #1. The

Identity Theft

The Dark Overlord group threatens to leak documents related to the September 11 attacks

The Dark Overlord hacker group has breached several insurance firms and legal firms and threatened to expose documents related to the September 11 attacks. The firms hacked by the Dark

Identity Theft

Strengthen Data Breach Defenses with Emulation Assessments

While cyber threats increase daily in volume and sophistication, data breach evaluation – an essential tool for validating the security of corporate and essential infrastructure – has lagged behind. This

Industry Insights

Guest Editor: Breaking the Barriers of Security

When I first started my degree, I knew next to nothing about cybersecurity. I knew I wanted to be an ethical hacker, but I probably couldn’t get far without even

Industry Insights

Bug Hunting Is Cybersecurity’s Skill of the Future

The vast majority of white hat hackers who reported that they were looking for jobs in cybersecurity said that their bug hunting experience helped them land a job, according to Bugcrowd’s 2018

Industry Insights

The Importance of “S” in “CISO”

A Chief Information Security Officer is the brigadier general of the security force of an organization. While the c-suite normally looks at the financial and overall management of an organization,