The day's top cybersecurity news and in-depth coverage
February 17, 2022
Bounties as high as $10 million dollars make hunting cryptocurrency vulnerabilities lucrative for those with the proper skillsets. It might eventually drive up fees for traditional bounties, too. Read more â¶
This guide provides you with information on the differences & offerings of Crowdsourced Software Security Testing Platforms, Traditional Consultancies, & Pentest as a Service vendors. Connect with the vendor best suited for you to bring you closer to finding, fixing, and preventing vulnerabilities.
Microsoft is previewing new Sentinel features that will make it easier for security admins to manage and analyze event logs.
Recent cyber attacks against Western entities operating in Ukraine aim to disrupt or conduct espionage. CISOs should be wary of such attacks expanding beyond the Ukrainian border.
The revelation of former U.S. President Trump allegedly mishandling and removing sensitive government documents presents presents unique security challenges.
New research links the ShadowPad remote-access Trojan to China's Ministry of State Security and the People's Liberation Army.
Survey finds significant jump in software supply chain attacks after Log4j exposed.
Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.