We have many clients who have their own software or have custom software on their website or web apps written for them by developers. These developers may or may not reuse code or modules written by third party developers and sourced through a software repository – such as GitHub or …
White Hat Hacking Competition
The white hat hacking competition Pwn2Own Toronto 2022 has revealed 63 zero-day flaws, that were there to be exploited by black hat hackers if they found them first, and collected nearly a million dollars in bounties: Hackers earn $989,750 for 63 zero-days exploited at Pwn2Own Toronto (bleepingcomputer.com) A good news …
Where the hackers sell your personal information and who buys it
The hackers have the motivation to steal your personal data and credentials as it is very easy for them to monetise these types of attacks. The threat actors have their own supply chains buried within webs of security and obfuscation. The hackers will steal the personal information, using a suite …
Continue reading “Where the hackers sell your personal information and who buys it”
Hackers freely buy and sell our data
There is a market for hackers – that is why the cyber security is very real for large and small organisations- although many smaller organisations hit will just be collateral damage. Hackers selling access to 576 corporate networks for $4 million (bleepingcomputer.com)
The things Google is doing to keep you safe online
Here are a couple of short articles from the Google blog that describes the different ways the company actively combats the threat actors to improve everyone’s online safety: Meet the hackers keeping you safe online (blog.google) Continuous innovation to keep you safe online (blog.google)