July 3, 2024
This guide explores how to understand and quantify the risk of DDoS attacks, prioritize assets based on business impact, and implement robust defense controls. It also covers assessing third-party risks and ensuring comprehensive observability. Read More ➟
April 17, 2024
Detailed policy, available which explains about DDoS Simulation testing, Terms & Conditions and also the AWS DDoS Testing Partners Read More ➟
October 13, 2023
In the ever-evolving landscape of cybersecurity, new vulnerabilities and attack vectors are discovered almost daily. One such recent discovery... Read More ➟
June 2, 2017
More than 1,000 mobile apps are leaking personal information via unsecured backend platforms such as MongoDB, MySQL and others. Read More ➟
Senators introduced a bill last week to establish a bug bounty pilot program within the Department of Homeland Security. Read More ➟
Researchers at Kaspersky Lab have found a number of programming errors in the WannaCry ransomware code that put file recovery within reach of sysadmins. Read More ➟
A breach at OneLogin appears to have compromised customer data, including the ability to decrypt encrypted data. Read More ➟
A crowdfunding effort to buy a subscription to the ShadowBrokers’ Monthly Dump Service of stolen exploits and data was shut down citing legal and ethical concerns. Read More ➟
Developers behind FreeRADIUS, an open source implementation of the networking protocol RADIUS, are encouraging users to update to address an authentication bypass found in the server. Read More ➟
Google announced today new security features in Gmail, including the news that it will enhance early phishing detection in Gmail through dedicated machine learning. Read More ➟