Report : Demystifying Artificial Intelligence in Information Security October 12, 2019 1,005 In its effort to support organizations around the world, ISF published the October 2019 edition of its "Demystifying Artificial Intelligence…
Browser extensions affect your digital security July 7, 2021 143 Browser extensions are programs that add a feature or perform a custom function during your browsing experience.
Facebook supports mobile security keys March 22, 2021 385 Facebook said it is expanding its support for 2FA physical security keys across mobile devices in order to better protect…
Razer’s data leak reveals players’ information September 14, 2020 252 Razer, a manufacturer of gaming devices, suffered from a data leak after an insecure database of its online store was…
ShiftLeft : 96% of developers think security hurts productivity July 6, 2020 323 In a new survey of more than 165 developers, application security and DevOps professionals, ShiftLeft found that 96% of developers…
Exploiting a security vulnerability in Microsoft Exchange March 11, 2020 318 Multiple government-backed hacking groups exploit a vulnerability that Microsoft corrected last month in Microsoft Exchange mail servers.
Security breach reveals 885 million sensitive financial documents May 25, 2019 275 According to a report by security researcher Brian Krebs, head of the KrebsOnSecurity security site, a security vulnerability of about…
Leaking a huge database containing information about Instagram accounts May 20, 2019 327 A huge database containing contact information for millions of celebrities and business accounts has been found on the Instagram website,…
Binance : a large scale security breach May 8, 2019 307 Binance, the largest digital money platform in the world, has confirmed its exposure to widespread penetration, allowing hackers to steal…
IBM : 77% of organizations with Cybersecurity Incident Response Plans Fail to Test Them April 18, 2019 316 IBM announced the results of a global study exploring the readiness of organizations to respond to any cyber attack. The…