Kali Linux, the popular open source Linux distribution specialized for penetration testing, ethical hacking and security auditing, can now be used by Linode customers. Getting Kali...
Recently, Normalyze, a data-first cloud security platform, came out of stealth with $22.2M in Series A funding. This was the perfect time to catch up with co-founder...
The notorious cybercriminal syndicate competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR...
https://player.vimeo.com/video/726721631?h=b7e8fe73dc&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 Often we see stories about cyber attacks that breached an organisations’ security parameters, and advice on how we can protect against future threats. However, what...
https://player.vimeo.com/video/728049837?h=8ca1dfa517&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 In recent years, zero trust security has gained incredible attention from the government, cybersecurity leaders and regulators. Many organisations are still fuzzy on what zero trust means,...
In some countries up to 90% of governmental websites add third-party tracker cookies without users’ consent. This occurs even in countries with strict user privacy laws,...
A key lawmaker on the House Homeland Security Committee wants more details on what was breached and what was lost when the SolarWinds Orion platform was...
The Python Package Index (PyPI) is rolling out two-factor authentication (2FA) for “critical projects” in the form of physical security keys. Mindful of the growing threat to software supply...
ANALYSIS The first four standardized protocols for post-quantum cryptography have been unveiled, laying the foundations for the development of apps and web technologies that incorporate “future proof” encryption....
It is possible to perform single-click account hijacking by abusing the OAuth process flow, a security researcher has found. OAuth, also known as Open Authentication, is...