Phishing Increasingly Targets SaaS, Webmail

How can companies protect their sensitive data and prevent employees from falling prey to phishing attacks? In today’s digital age, virtually every organization must wage a cybersecurity battle to protect its data. Winning this battle requires engagin… Continue reading Phishing Increasingly Targets SaaS, Webmail

City of Johannesburg, on Second Hit, Refuses to Pay Ransom

A Shadow Kill Hackers attack that compromised the city’s network and shut down key services was the second ransom-related attack on the city in months. Continue reading City of Johannesburg, on Second Hit, Refuses to Pay Ransom

Two Companies in New Jersey Hacked with Keyloggers

A hacker from New Jersey could spend the next 12 years in prison after he confessed to using keyloggers to steal data from two companies for more than a year. Ankur Agarwal, 45, of Montville, New Jersey, admitted he placed hardware keyloggers into the … Continue reading Two Companies in New Jersey Hacked with Keyloggers

Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’

Marc Rogers discusses the logistics behind a recently-proposed anonymous bug submission program, meant to encourage ethical hackers to submit high-level bugs anonymously. Continue reading Marc Rogers: Success of Anonymous Bug Submission Program ‘Takes A Village’

Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153

Elements of an Effective Penetration Testing Program
The post Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153 appeared first on Security Weekly. Continue reading Elements of an Effective Penetration Testing Program – Steve Laubenstein – ESW #153