Report : Demystifying Artificial Intelligence in Information Security أكتوبر 12, 2019 1٬005 In its effort to support organizations around the world, ISF published the October 2019 edition of its "Demystifying Artificial Intelligence…
Browser extensions affect your digital security يوليو 7, 2021 143 Browser extensions are programs that add a feature or perform a custom function during your browsing experience.
Facebook supports mobile security keys مارس 22, 2021 385 Facebook said it is expanding its support for 2FA physical security keys across mobile devices in order to better protect…
Razer’s data leak reveals players’ information سبتمبر 14, 2020 252 Razer, a manufacturer of gaming devices, suffered from a data leak after an insecure database of its online store was…
ShiftLeft : 96% of developers think security hurts productivity يوليو 6, 2020 323 In a new survey of more than 165 developers, application security and DevOps professionals, ShiftLeft found that 96% of developers…
Exploiting a security vulnerability in Microsoft Exchange مارس 11, 2020 318 Multiple government-backed hacking groups exploit a vulnerability that Microsoft corrected last month in Microsoft Exchange mail servers.
Security breach reveals 885 million sensitive financial documents مايو 25, 2019 275 According to a report by security researcher Brian Krebs, head of the KrebsOnSecurity security site, a security vulnerability of about…
Leaking a huge database containing information about Instagram accounts مايو 20, 2019 327 A huge database containing contact information for millions of celebrities and business accounts has been found on the Instagram website,…
Binance : a large scale security breach مايو 8, 2019 307 Binance, the largest digital money platform in the world, has confirmed its exposure to widespread penetration, allowing hackers to steal…
IBM : 77% of organizations with Cybersecurity Incident Response Plans Fail to Test Them أبريل 18, 2019 316 IBM announced the results of a global study exploring the readiness of organizations to respond to any cyber attack. The…