While the payoff can be huge for the freelance bug bounty hunters, sometimes they have also been facing various challenges over their sensitive role of their work. Ethical or white…
cyberattacks
-
-
According to the EU cybersecurity agency ENISA’s annual report released on Wednesday, hackers-for-hire have emerged as the biggest threat to online security in the last 15 months, with the COVID-19…
-
Why Shadow Code Pose Risks to Websites and Jeopardizes Compliance with Privacy Regulations
by CIO AXISAccording to a research study, the shadow code — third-party scripts and libraries frequently used in web applications pose security risk to website. Read on to know more… According to…
-
-
-
Cyberattacks from Russian nation-state actors are increasingly effective, jumping from a 21% successful compromise rate last year to a 32% rate this year. This is one of the insights in…
-
Mirai_ptea_Rimasuta, an old and unpopular Mirai variant, has reappeared, this time exploiting a zero-day vulnerability in RUIJIE routers. The Mirai_ptea botnet was first discovered in June, abusing an undiscovered vulnerability…
-
After a report found that attackers often exploit unpatched systems, organizations are being urged to be more proactive when it comes to protecting against vulnerabilities. The Trustwave SpiderLabs Telemetry Report…
