Research by HackerOne, a hacker-powered security platform, has revealed hackers are finding over twice as many vulnerabilities in software in 2020 than they were in 2019. Hackers have helped find…
hackers
-
-
Penetration of an organization’s local network takes as little as 5 minutes, according to a new report from Positive Technologies, one of the largest cybersecurity research firms in Europe. Positive…
-
Research report outlines advanced attack scenarios and recommendations for OT operators Trend Micro has recently released research describing how advanced hackers could leverage unconventional, new attack vectors to sabotage smart…
-
54% of businesses consider employee mistakes the biggest threat to sensitive data, according to according to a new study from nCipher Security and the Ponemon Institute. The 2020 Global Encryption…
-
Hidden apps are the most active mobile threat facing consumers, generating nearly 50% of all malicious activities in 2019- a 30% increase from 2018, according to McAfee which has released…
-
Beware: Attackers are finding new ways to avoid detection when they compromise email accounts. Researchers from Barracuda and UC Berkeley, conducting a large-scale analysis of email account takeover and the…
-
Hackers are exploiting SQL injection flaws to infect MySQL database servers with a malware program that’s used to launch distributed denial-of-service (DDoS) attacks. Security researchers from Symantec found MySQL servers…
-
Hackers who compromise websites are also increasingly verifying themselves as the owners of those properties in Google’s Search Console. Under certain circumstances this could allow them to remain undetected longer…
