4,145 Results for:hacker
- Sort by:
WhatsApp vulnerabilities let hackers alter messages
10 Aug 2018News roundup: New WhatsApp vulnerabilities enabled hackers to alter messages sent in the app. Plus, the PGA was hit with a ransomware attack, and more. Read More
CW Benelux: Netherlands offers young hackers re-education
09 May 2019Young hackers in the Netherlands are being rehabilitated through punishments that educate rather than incarcerate. Also read how almost 90% of businesses in the Netherlands are barely aware of the competitive ... Read More
5 actionable deception-tech steps to take to fight hackers
10 Dec 2018Consider taking these five 'deceptive' steps to make your detection and response capabilities speedier, more effective and to improve your company's security posture. Read More
Pen testing guide: Types, steps, methodologies and frameworks
07 Apr 2022Penetration testing helps organizations find security vulnerabilities before hackers do. Uncover details about pen testing steps, methodologies, frameworks and standards. Read More
Most infosec pros would trust hacker-tested products
25 Jun 2018Information security professionals are more likely to trust a product or company tested by hackers and most would respond to security reports from this community, a survey has revealed Read More
How white hat hackers can tell you more than threat intelligence
19 Jun 2018White hat hackers can play a key role in assessing threats lurking on the dark web. Discover what traditional threat intelligence isn't telling you and how white hats can help. Read More
Salesforce helps customers establish bug bounty programmes
10 Apr 2024Salesforce has added new learning content to its Trailhead platform designed to help customers develop their own bug bounty programmes Read More
Unethical vulnerability disclosures 'a disgrace to our field'
22 Apr 2022The cybersecurity field needs more people who use their powers for good, the lead author of Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition says. Read More
How do hackers use legitimate admin tools to compromise networks?
10 Oct 2018Hackers use legitimate admin tools to exfiltrate data in living off the land attacks that are hard to detect. Learn about this cyberattack tactic from expert Michael Cobb. Read More
2021 another record-breaker for vulnerability disclosure
08 Dec 2021More than 50 CVEs were logged every day in 2021, more than at any time since records began, while ethical hackers continue to prove their value Read More