Hacking
8 Essential Windows Security Tips to Protect Your Computer
Windows operating systems and software are complex pieces of software with millions of lines of code. This means that there are many potential vulnerabilities, or flaws, that can be exploited by attackers ...
Educating the Next Cybersecurity Generation with Tib3rius
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Hacking the High School Grading System
Interesting New York Times article about high-school students hacking the grading system. What’s not helping? The policies many school districts are adopting that make it nearly impossible for low-performing students to fail—they ...
How to Protect Against Data Lake Hacking
Data lakes, or centralized repositories for large-scale data, are a popular solution for data storage, and there are good reasons for that. Data lakes are flexible and cost-effective, as they allow many ...
Understanding the Cyber Kill Chain: A Comprehensive Guide to Cybersecurity
In today’s interconnected digital world, cyberattacks have become an ever-present threat to individuals, businesses, and governments. To defend against these threats effectively, cybersecurity experts have developed various frameworks and models to understand ...
Employee Spotlight – Dimitrios Tsarouchas
We spoke to Senior Security Analyst, Dimitrios Tsarouchas For this month’s employee spotlight piece, we spoke to Senior Security Analyst, Dimitrios Tsarouchas. How long have you been working at SE Labs? I’ve ...
SaaS Attacks: Compromising an Organization without Touching the Network
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...
Millions affected by Duolingo, Mom’s Meals data breaches
As the months roll on in 2023, so too do the data breaches. Millions of people are affected by data breaches against all sorts of different services and entities, and the data ...
Level:Up cyber security education programme
SE Labs ran a second year of its cyber security education programme About Level:Up SE Labs ran a second year of its Level:Up cyber security education programme, partnering with local schools to ...
Breaking Free From Unwanted Mobile Phone Calls: A Guide to Regaining Control of Your Personal Space
How many times have you been in the middle of a meeting, a meal, or just a much-needed moment of relaxation, only to be interrupted by an incessant ringing from your mobile ...