What you need to know about Log4Shell
Photo by ThisIsEngineering from Pexels Considered one of the largest exploitable vulnerabilities in history, Log4Shell affects many as Log4J is one of the most extensively used logging libraries....
UK Cyber Sector Generates Record Investment and Revenue
More than £1bn was raised in external investment across 84 deals in the most recent financial year Read More
Over 620 Million Ransomware Attacks Detected in 2021
Attacks on government targets soar almost 1900% Read More
Skyrocketing cryptocurrency bug bounties expected to lure top hacking talent
As high-stakes cryptocurrency and blockchain projects proliferate and soar in value, it’s no surprise that malicious actors were enticed to steal $14 billion in cryptocurrency...
Sykyrocketing cryptocurrency bug bounties expected to lure top hacking talent
As high-stakes cryptocurrency and blockchain projects proliferate and soar in value, it’s no surprise that malicious actors were enticed to steal $14 billion in cryptocurrency...
When the insider threat is the Commander in Chief
When the insider is the President of the United States, the mishandling and removal of information take on a different demeanor given the national security...
Researchers Block “Largest Ever” Bot Attack
Web scraping raid generated 400 million requests Read More
Red Cross Attackers Exploited Zoho Bug Used by China
Breach bears many of the hallmarks of a state-sponsored attack Read More
Smashing Security podcast #262: Macro progress, eyeball-tracking ads, and encryption backdoors
How does Microsoft hope to defeat the macro terror? How is the UK Government trying to influence the public's opinion on end-to-end encryption? And what...
SEC Consult SA-20220215 :: Multiple Critical Vulnerabilities in multiple Zyxel devices
Posted by SEC Consult Vulnerability Lab, Research via Fulldisclosure on Feb 16 SEC Consult Vulnerability Lab Security Advisory < 20220215-0 > ======================================================================= title: Multiple Critical...