Tenable’s Acquisition Of Cymptom: An “Attack Path-Informed” Approach to Cybersecurity
Tenable’s recent acquisitions all had the same overarching goal: helping our customers gain better security insights across their cyberattack surface. At our investor day in...
Social Media: How to Steer Your Family Clear of Cryptomining Malware
It’s fun to jump on our favorite social media sites such as Facebook, Instagram, or LinkedIn and know we can quickly check in with friends...
New quantum key distribution network resistant to quantum attacks
New research has revealed the full viability of a novel quantum key distribution (QKD) network for metropolitan areas that is resistant to quantum computing attacks....
What you need to know about Log4Shell
Photo by ThisIsEngineering from Pexels Considered one of the largest exploitable vulnerabilities in history, Log4Shell affects many as Log4J is one of the most extensively used logging libraries....
UK Cyber Sector Generates Record Investment and Revenue
More than £1bn was raised in external investment across 84 deals in the most recent financial year Read More
Over 620 Million Ransomware Attacks Detected in 2021
Attacks on government targets soar almost 1900% Read More
Skyrocketing cryptocurrency bug bounties expected to lure top hacking talent
As high-stakes cryptocurrency and blockchain projects proliferate and soar in value, it’s no surprise that malicious actors were enticed to steal $14 billion in cryptocurrency...
Sykyrocketing cryptocurrency bug bounties expected to lure top hacking talent
As high-stakes cryptocurrency and blockchain projects proliferate and soar in value, it’s no surprise that malicious actors were enticed to steal $14 billion in cryptocurrency...
When the insider threat is the Commander in Chief
When the insider is the President of the United States, the mishandling and removal of information take on a different demeanor given the national security...
Researchers Block “Largest Ever” Bot Attack
Web scraping raid generated 400 million requests Read More