60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low

60% of UK Workers Have Been Victim of a Cyber-Attack, Yet Awareness Remains Low There is a “dangerous” lack of awareness among UK workers towards cybersecurity, leaving businesses at risk…

NPK: Free tool to crack password hashes with AWS

The NPK tool is an open-source password cracking tool developed by the Coalfire Labs Research and Development team. The initials NPK are inspired by the atomic elements contained within farm…

Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks

Researchers from ETH Zurich conducted a study to investigate who is more prone to fall victim to phishing cyberattacks in a corporate context. The study involved 14,733 participants and was…

NSO Group's latest spyware on par with nation-state abilities, researchers say

Written by AJ Vicens Dec 15, 2021 | CYBERSCOOP When Apple announced Nov. 23 that it filed a lawsuit against Israeli spyware firm NSO Group, it claimed that the firm…

SAP Kicks Log4Shell Vulnerability Out of 20 Apps

SAP’s still feverishly working to patch another 12 apps vulnerable to the Log4Shell flaw, while its Patch Tuesday release includes 21 other fixes, some rated at 9.9 criticality. SAP has…

Meta targets user information, database scraping in bug bounty expansion

Meta has announced an expansion to its bug bounty platform to include vulnerabilities that can be abused for data scraping.  On Wednesday, the company – recently rebranded from Facebook –…

Irani and Chinese State Hackers Exploiting Log4j Vulnerability

According to John Hultquist, VP of Intelligence Analysis, Mandiant, Iranian state hackers are specifically aggressive with this Log4j vulnerability. Cybersecurity firms Mandiant and CrowdStrike have confirmed that Iranian and Chinese…

A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

Why a skills shortage is one of the biggest security challenges for companies

Almost every company building an application needs to secure it, and yet all of them face an enormous constraint: talent.  Security requires a highly specialized skill set, which is in…

Tactical Threat Intelligence: How to shield data from advanced attacks

Struck by the reality of remote collaboration, companies had to rethink both their business strategy and their infrastructure. This led many large enterprises and public organizations to restructure their data…