Researchers find vulnerability to bypass web application firewalls

Researchers from Claroty, a cybersecurity company specializing in securing the internet of…

Over 5.4 million Twitter users’ data stolen, leaked online

According to reports, over 5.4 million Twitter users’ data was stolen through…

The mental health impact of ransomware attacks

Ransomware attacks are on the rise with no slowdown in sight. With…

Google releases YARA rules for Cobalt Strike to deter abuse

Cobalt Strike is one of the most popular red team tools to…

Google rewards hacker with $70K for Pixel Phone lock screen bypass bug

Google has paid David Schütz, a hacker and security researcher, $70,000 for…

APT29 using Windows Credential Roaming bug to target diplomats

A new report from Mandiant, the cybersecurity firm recently acquired by Google,…

S3crets Scanner scans AWS S3 buckets for secrets

A new open source tool ‘S3crets Scanner’ scans Amazon Web Services (AWS)…

Gen Z, Millennial workers are biggest workplace cybersecurity risks

New research conducted by Ernst & Young finds that a majority of…

Microsoft Office 365 email encryption vulnerability could expose message content

Researchers from cloud and endpoint protection firm WithSecure has discovered an unpatchable…

White House to unveil cybersecurity label for IoT devices

The White House has announced in a public statement entitled, “Strengthening America’s…