Blog
The LAPSUS$ gang’s claims of compromise are being investigated by Okta
UPDATED Okta, the authentication and identity management behemoth, is looking into reports that rogue hackers broke into its internal network with the...
How To Combat Modern Cyber Security Challenges?
Cyber threats are a never-ending issue in the web world. Companies, individuals, and even nations are under cyber threats. The probability of being...
All About Penetration Tester & Steps To Become One
In the digital world, businesses operate primarily on the internet. The web has made life easier in many ways. Because of the design and concept of...
The HP cyber security acquisition came at a time when malware risks were on the rise
CNBC looks back at the companies who made the first Disruptor 50 list ten years later in this weekly series. Bromium's thesis when it first appeared on...
What Does A Certified Ethical Hacker Do?
Everyone is aware of the word "hacker," even if they are not related to the computer world. The term "Hacker" is broadly used to portray an individual...
A new era in travel risk management has arrived.
The need for smart and scalable travel risk management solutions to protect enterprises and their workers has grown in recent years. Recent events have...
E-commerce behemoth The source code data breach has been confirmed by Mercado Libre
This week, the Argentinian e-commerce behemoth Mercado Libre disclosed "unauthorised access" to a portion of its source code. Threat actors allegedly...
CISA Expands Its List of Actively Exploited Vulnerabilities by 95.
The United States' Cybersecurity and Infrastructure Security Agency (CISA) published 95 new security weaknesses to its Known Exploited Vulnerabilities...
TeaBot Trojan infects Google Play Store Once More
By hiding trojans in software upgrades, malicious Google Play apps have gotten beyond restrictions. According to Cleafy researchers, the TeaBot banking...