News
Shadow IT used to be a fringe problem, a rogue Dropbox account here, a personal Gmail there. Now, it’s everywhere. One ...
A report published today by Wallarm finds that of the 639 Common Vulnerabilities and Exposures (CVEs) pertaining to application programming interfaces APIs continue to be one of the weakest links in ...
Davis Lu was convicted in March of deploying malicious code in the systems of his employer, Eaton, when his job responsibilities change and then deployed a kill switch that denied employees access to ...
DDoS attacks were once crude instruments—digital sledgehammers that would flood a target with massive amounts of traffic until it crashed. While these brute-force assaults remain common, a new ...
Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make most ...
UK organizations with sponsor licenses are now targets in a credential-harvesting phishing campaign. This campaign impersonates the UK Home Office and mimics the Sponsor Management System (SMS) login ...
Is your Strategy for Cloud Compliance Intelligent Enough? One question prevails: is your compliance strategy smart enough to handle the complexities of the cloud environment? Understanding Non-Human ...
Jerry Gamblin Our deep appreciation to Security BSides - San Francisco and the Creators, Authors and Presenters for publishing their BSidesSF 2025 video content on YouTube. Originating from the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results