
Is it possible not to be exposed to hackers?
Quite a common obstacle in joining a bug bounty program is the decision of the company management that they don’t want to be exposed to

Quite a common obstacle in joining a bug bounty program is the decision of the company management that they don’t want to be exposed to

The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate, expanding on its ability to target devices

Romanian cybersecurity company Bitdefender has released a free universal decryptor for a nascent file-encrypting malware known as MortalKombat. MortalKombat is a new ransomware strain that

Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs, which made the discovery, said

A stealthy Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus has become the first publicly known malware capable of bypassing Secure Boot defenses, making it

Petr Smolník, editor-in-chief of AVERIA.NEWS, asked Pavel Luptak, co-founder of Hacktrophy and CEO of Nethemba, about what a bug bounty program is, how it works