Micropatches: What they are and how they work

In this Help Net Security video, Mitja Kolsek, CEO at Acros Security, discusses micropatches, a solution to a huge security problem. With micropatches, there are no reboots or downtime... Read more »

Palo Alto Networks CTO Talks Securing ‘Code to Cloud’

The company’s CTO of its Prisma Cloud says that when the software development process meets continuous integration and development, security must be efficient and holistic. The post Palo Alto... Read more »

How to bypass CAPTCHAs online with Safari on iOS 16

Tired of those annoying CAPTCHA images that leave you feeling like you’re solving a puzzle just to log in online? Learn how to use Apple’s “CAPTCHA killer” feature called... Read more »

Okta moves passkeys to cloud, allowing multi-device authentication

Okta’s formula for multi-device identity authentication for a hybrid workforce: extract passwords, add ease of passkeys across devices. The post Okta moves passkeys to cloud, allowing multi-device authentication appeared... Read more »

10 open-source recon tools worth your time

Recon is the initial stage in the penetration testing process. It’s a vital phase allowing the tester to understand their target and strategize their moves. Here are ten open-source... Read more »

Fiddler Auditor: Open-source tool evaluates the robustness of large language models

Fiddler Auditor is an open-source tool designed to evaluate the robustness of Large Language Models (LLMs) and Natural Language Processing (NLP) models. LLMs can sometimes produce unwarranted content, potentially... Read more »

BBC, British Airways, Boots hit with hackers’ ultimatum after suffering MOVEit supply-chain attack

Get the details about the ransomware group Clop’s ultimatum to companies they recently hit with a supply-chain attack. Also, learn cybersecurity mitigation best practices for any organization. The post... Read more »

Duo vs Microsoft Authenticator (2023): In-depth comparison

This is a comparison of Duo and Microsoft Authenticator. Learn more about their key differences, features, security, and performance in this in-depth analysis. The post Duo vs Microsoft Authenticator... Read more »

20 cybersecurity projects on GitHub you should check out

Open-source GitHub cybersecurity projects, developed and maintained by dedicated contributors, provide valuable tools, frameworks, and resources to enhance security practices. From vulnerability scanning and network monitoring to encryption and... Read more »

New zero-click threat targets iPhones and iPads

A recent report from Kaspersky revealed a zero-click attack method that requires no action from victims to infect iOS devices. The post New zero-click threat targets iPhones and iPads... Read more »
Subscribe to our Newsletter