Australia & New Zealand Retail and eCommerce Industry Threat Report

The Retail Industry’s cyber security landscape was reshaped by COVID-19 and the accelerated uptake of eCommerce platforms. This transition from traditional ‘bricks and mortar’ stores was necessary to ensure business…

Role of digital signatures in asymmetric cryptography

Encryption and decryption Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data from unauthorized users.…

Reflections in the wake of RSA 2021: Cyber resiliency

Security Magazine |  Security Magazine |  Reflections in the wake of RSA 2021: Cyber resiliency | 2021-06-01 | Security Magazine This website requires certain cookies to work and uses other…

Risks of preinstalled smartphone malware in a BYOD environment

The bring-your-own-device (BYOD) trend has been growing for many years, but the wider adoption of a remote or hybrid workforce in a post-COVID world may create an influx of personal…

DreamBus Botnet: An analysis

A new variant of the SystemdMiner threat dubbed DreamBus is impacting Linux servers around the globe to mine cryptocurrency. Linux servers serve an important role in cloud-based infrastructures. This operating…

What’s New at OffSec – May 2021

Discord Server Updates Server Statistics It’s been nearly a month since we’ve migrated the community from our Rocket.chat self-hosted platform to Discord.  Before Rocket.chat closed, we had roughly 8200 users…

Project Launch : Tracking Browser Security Enhancements

TL;DR: NotSoSecure is releasing a new project to track security enhancements or downgrades in browsers: https://notsosecure.github.io/browser-security-enhancements/ Introduction Our lives have been slowly moving from desktop applications to browser-based applications and…

How to run a software composition analysis tool

Protecting your organization’s website from cyberthreats is important. Websites and data servers hold important information, after all. One way to project your website is by utilizing a web application security tool.…

How to run a SAST (static application security test): tips & tools

There are a number of different was to test the security of web applications, such as: Dynamic application security testing (DAST) Interactive application security testing (IAST) Static application security testing…

How to run an interactive application security test (IAST): Tips & tools

There are several popular approaches to testing and securing websites, including:  Dynamic application security test (DAST) Interactive application security test (IAST) Static application security test (SAST) Software composition analysis (SCA)…