SpecterOps announces version 5.0 of BloodHound Active Directory mapping tool with enterprise-grade deployment, usability, and UI.
Hi, what are you looking for?
SpecterOps announces version 5.0 of BloodHound Active Directory mapping tool with enterprise-grade deployment, usability, and UI.
SecurityWeek speaks to Youssef Sammouda about using cybersecurity research and bug bounties as a way of life and source of income.
Researchers discovered two vulnerabilities in the Ubuntu OverlayFS module: CVE-2023-2640 and CVE-2023-32629 (together dubbed ‘GameOver(lay)’).
Machine Learning and Artificial Intelligence security firm Protect AI raised $35 million in Series A funding led by Evolution Equity Partners.
SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role.
TETRA:BURST - vulnerabilities in widely used radio standard could threaten military and law enforcement communications, as well as ICS.
100% key capture rate and successful ransomware decryption shows progress in ransomware defense capabilities.
While traditional security awareness teaches users how to recognize social engineering, new behavior changing trains the brain on the correct recognition and response to...
Security awareness training isn’t working to the level it needs to. Social engineering, however, is getting better. Why doesn’t awareness training work, and how...
Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...
QuickBlox SDK and API vulnerabilities impact chat and video applications used by industries including telemedicine, smart IoT, and finance.
Bugcrowd’s Inside the Mind of the Hacker report shows the speed and efficiency of hackers adopting new technologies to assist their hunting