Cyberbit, provider of Cyber Skills Development Platforms, revealed the results of the first annual Cyberbit SOC Skills Survey. In the fourth quarter of 2020, Cyberbit surveyed...
Enterprises worldwide are accelerating the adoption of passwordless authentication technologies in response to the increase in cybersecurity threats in 2020, according to a new report released...
A new variant of the freshly minted NAT slipstreaming attack has emerged that could use unmanaged, internal network devices as a bridgehead to – in the...
Here are the news and updates you may have missed. It is not accurate to describe widespread cyber intrusions that compromised several government agencies and cybersecurity...
The Defense Department wants a vendor to manage the next phase of development for the insider threat program’s central database and case management. The Defense Department’s...
Multiple vulnerabilities in open source video platforms YouPHPTube and AVideo could be leveraged to achieve remote code execution (RCE) on a user’s device. Researchers from Synacktiv discovered multiple vulnerabilities in the source...
A new machine learning technique could make it easier for penetration testers to find SQL injection exploits in web applications. Introduced in a recently published paper by researchers...
The domain registration belonging to Perl.com, the popular source of news and information about the Perl programming language, has reportedly been stolen. Brian Foy, a Perl...
As Joe Biden takes office, Justin Crump – CEO of the global risk and intelligence consultancy Sibylline, takes stock of the challenges the new administration will...
In the past year, COVID-19 has had a larger impact on work habits and security environments than any other health emergency in memory. That combined with...