75 Results for:404
- Sort by:
How to use Wfuzz to find web application vulnerabilities
23 May 2023By learning how to use Wfuzz for web application fuzz testing, bug bounty hunters can automate vulnerability discovery. Learn more in this excerpt from 'Bug Bounty Bootcamp.' Read More
Why the Keitaro TDS keeps causing security headaches
09 Apr 2024Keitaro insists it is on the side of the law, but threat actors continue to flock to the software company's traffic distribution system to redirect users to malicious domains. Read More
Link rot explained: Everything you need to know
10 Aug 2023Link rot, the deterioration of hyperlinks over time, leads to broken links on the internet, data loss and other issues. Prevent and fix link rot with proper mitigation techniques. Read More
Openreach claims connectivity landmark with Fair Isle full fibre
03 Jan 2024UK’s leading broadband provider furthers Scottish roll-out of gigabit connectivity with full fibre to the UK’s most geographically remote inhabited island, with funding from Scottish government’s R100 programme and... Read More
NCC Group records the most ransomware victims ever in 2023
08 Feb 2024Enterprises faced an alarming number of ransomware attacks as gangs targeted supply chains and took advantage of zero-day vulnerabilities and organizations' patching struggles. Read More
CISOs on alert following SEC charges against SolarWinds
17 Jan 2024The Securities and Exchange Commission announced charges against SolarWinds and its CISO in October, but will it help improve transparency or simply scare infosec executives? Read More
How to make a strong business case for software projects
15 Dec 2023Every software project proposal requires in-depth research into the technical aspects at play, but the business case for the project should tone down the tech talk. Read More
8 data protection challenges and how to prevent them
17 Apr 2024Businesses contend with a combination of issues spawned by data overload, privacy regulations, access rights, cyberattacks, cloud environments, generative AI and human error. Read More
Defence lawyers seek appeal of tribunal ruling on police EncroChat cryptophone hack
20 Nov 2023Defence lawyers are seeking leave to appeal against a tribunal ruling that found the National Crime Agency had lawfully obtained warrants to access messages from 9,000 cryptophones used in the UK Read More
NPM API flaw exposes secret packages
13 Oct 2022A flaw in the API for NPM could potentially allow a threat actor to see the internal packages for corporate users -- a possible first step for a supply chain attack. Read More