How scanners find vulnerabilities Security DAST vulnerability scanners are not that different from virus scanners.… rooter February 20, 2023 1 min read 0
Acunetix releases IAST support for WebSphere and improves crawling of SPAs Security A new Acunetix Premium update has been released for Windows,… rooter February 20, 2023 1 min read 0
5 reasons why web security is important to avoid ransomware Security Ransomware has been a source of major problems for many… rooter February 20, 2023 1 min read 0
7 steps to avoid uncoordinated vulnerability disclosure Security Imagine the following situation. You work as a cybersecurity manager… rooter February 20, 2023 1 min read 0
Hackers: The third pillar of security Security Every business knows that to maintain security, you need the… rooter February 20, 2023 1 min read 0
Red teaming – 5 tips on how to do it safely Security Red team vs blue team exercises are a very effective… rooter February 20, 2023 1 min read 0
Fines as a Security System Security Tile has an interesting security solution to make its tracking… rooter February 20, 2023 2 min read 0
Friday Squid Blogging: Thermal Batteries from Squid Proteins Security Researchers are making thermal batteries from “a synthetic material that’s… rooter February 17, 2023 1 min read 0
Search ads abused to spread malware – Week in security with Tony Anscombe Security Threat actors used search engine ads to impersonate makers of… rooter February 17, 2023 1 min read 0
Defending against AI Lobbyists Security When is it time to start worrying about artificial intelligence… rooter February 17, 2023 7 min read 0