A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National…
Author: admin
HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects
Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like,…
SailPoint Files IPO Plan: 5 Things To Know
SailPoint is pursuing its return as a public company after several years of major growth under…
HPE Investigating Breach Claims Involving Source Code: Report
Hewlett Packard Enterprise acknowledged it is investigating claims by a threat actor that reportedly involve theft…
Seekr Welcomes National Security Executive Dr. Lisa Costa to AI Advisory Board
Seekr®, the trusted AI company, today announced that National Security Executive Dr. Lisa Costa has joined its advisory…
DryRun Security Secures $8.7M, Launches Natural Language Code Policies to Save Time and Decrease Risk in Application Security
DryRun Security, the AI-native company delivering application security (AppSec) for development and security teams, today announced…
Call for Presentations Open for SecurityWeek’s 2025 Supply Chain Security & Third-Party Risk Summit
The increasing frequency and severity of software supply chain attacks have sent shockwaves through the cybersecurity…
Top Cybersecurity Threats, Tools and Tips
The cyber world’s been buzzing this week, and it’s all about staying ahead of the bad…
Ransomware on ESXi: The Mechanization of Virtualized Attacks
In 2024, ransomware attacks targeting VMware ESXi servers reached alarming levels, with the average ransom demand…
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
No less than 4,000 unique web backdoors previously deployed by various threat actors have been hijacked…