Three years have passed since the day when we published the details of the first vulnerability in SAP HANA. Nowadays…
In this Winter 2018 review, we check the pulse of exploit kits and their latest developments. Categories: Exploits Threat analysis…
Last week, news broke that an Iranian hacker network, Mabna Institute, had been systematically stealing data from universities across the…
In PHP, as in every other programming language you use for web development, developers should avoid writing code that passes…
Take care when typing a domain name into a browser address bar, because it's far too easy to fat-finger a…
(R⁶ == brief, low-expository posts) @yoniceedee suggested I look at the Cambridge Analytics “whistleblower” testimony proceedings: @hrbrmstr giving the term…
As the volume of both card-based payments and digital payments continue to grow significantly year-on-year, the importance of securing sensitive...…
San Francisco-based Cloudflare has traversed an interesting path to becoming a leading cybersecurity vendor. Back in 2004, Matthew Prince and…
As many news outlets have reported, Atlanta is recovering from an attack on its city computers that occurred on the…
Welcome to the fourth blog introducing and exploring the features of Burp Suite. Please visit Secure Ideas’ previous blogs on…