Passwords are vulnerable that’s where salting an essential technique in cybersecurity is used. This article delves into the world of salting in hashing.
Continue ReadingVideos
Patching and Vulnerability Research
Two critical components that underpin defense are patch management and vulnerability research. Understanding their relationship is essential.
Continue ReadingTexas ATMs Hacked
ATMs in Texas Harris County have been hacked in an ATM jackpotting scheme resulting in the theft of nearly a quarter of a million dollars in four days.
Continue ReadingNobitex Suffers Cyberattack
Iran’s leading cryptocurrency exchange, Nobitex, has been hit by a cyberattack with sources claiming the hackers made off with a staggering $90 million.
Continue ReadingIranian Cyberattacks Threat
The Department of Homeland Security (DHS) recently issued a stark bulletin warning of a heightened risk of cyberattacks against the United States.
Continue ReadingHackers Target Indian Websites
Pakistani hackers have launched cyberattacks targeting Indian defence and government linked websites and the potential for a full-blown cyber conflict.
Continue ReadingArtificial Intelligence Human Cost
What if the artificial intelligence we perceive is heavily reliant on human labor and what if that labor comes at a devastating human cost?
Continue Reading$800,000 Crypto Scam Nightmare
A retired Georgia couple is sharing their painful experience after falling victim to a sophisticated crypto scam that drained their life savings.
Continue ReadingT-Mobile Data Breach $350 Million
If you are a T-Mobile customer, you might be in line for a settlement check. Following a data breach. $350 million settlement reached in a class-action lawsuit.
Continue Reading23andMe Fine £2.31M for Data Breach
Genetic testing company 23andMe has been hit with a hefty £2.31 million (GBP) fine by the U.K. Information Commissioner’s Office (ICO) for a data breach.
Continue ReadingCyber Attack Attribution
Assigning blame, or attribution for a cyber attack is a notoriously difficult process plagued by technical hurdles and geopolitical complexities.
Continue ReadingThreat Intelligence Policy Tools
A robust threat intelligence policy is the cornerstone of a proactive defense, and that policy’s effectiveness hinges on the tools that support it.
Continue ReadingSecuring Wireless Data Transmission
Securing wireless data transmission is paramount, especially for organizations handling sensitive information no field demands greater security.
Continue Reading