How BIC is removing roadblocks for Black security pros
Cybersecurity pro Alana Scott was building her skills and her career in the conventional manner: by attending conferences and looking to network. But she and...
Malware explained: Definition, examples, detection and recovery
What is malware? Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs attackers use to wreak...
Google: Vendors Accelerate Bug Fixes to Just 52 Days
Google’s 90-day deadline exceeded only once in 2021 Read More
Trustpilot Sues Immigration Biz for Alleged Fake Reviews
Reviews site claims firm has ignored its enforcement action Read More
Friday Squid Blogging: Climate Change Causing “Squid Bloom” along Pacific Coast
The oceans are warmer, which means more squid. As usual, you can also use this squid post to talk about the security stories in the...
New Magnet Forensics app automates, coordinates cybersecurity response
A slow response to a data breach or other cybersecurity incident can cost companies time and money, as well as damage to their reputation. To...
Prison for Nintendo Pirate
Games giant thanks US authorities for securing 3-year prison term for Team-Xecuter leader Read More
Marketing Firm Exposes Lead Data
Cybersecurity researchers find PII of millions of people in unsecured Amazon S3 Bucket Read More
Immediata Agrees $1.125m Data Breach Settlement
Software company agrees to settle class action lawsuit filed by victims of 2019 security breach Read More
Major SAP vulnerability requires urgent patch to prevent HTTP request smuggling attacks
Security researchers, enterprise software maker SAP, and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have issued warnings over a critical vulnerability affecting Internet Communication...