Web Applications
-
Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn
Following a busy January, the cybersecurity M&A market remained active in February 2025, with several key mergers and acquisitions (M&As)…
-
ESET Threat Report H2 2024
ESET Research Threat Reports A view of the H2 2024 threat landscape as seen by ESET telemetry and from the…
-
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of…
-
The $10 Cyber Threat Responsible for the Biggest Breaches of 2024
You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the…
-
Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges
Critical national infrastructure (CNI) providers are getting better at remediating exploited vulnerabilities and other cyber hygiene best practices, according to…
-
Pastor’s “dream” crypto scheme alleged to be a multi-million dollar scam
A federal grand jury has indicted a 51-year-old church pastor on 26 counts of fraud, after allegedly using his position…
-
Web Hacking Service ‘Araneida’ Tied to Turkish IT Firm – Krebs on Security
Cybercriminals are selling hundreds of thousands of credential sets stolen with the help of a cracked version of Acunetix, a…
-
How to Plan and Prepare for Penetration Testing
As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new…
-
WhatsApp’s “View Once” Bug Lets Hackers Save Messages
Researchers have found a critical flaw in WhatsApp’s “View Once” feature that was found to be actively exploited by threat…
-
New Tools, Tactics, and Targets – Sophos News
After a brief break in activity, Sophos X-Ops continues to observe and respond to what we assess with high confidence…