Top open-source vulnerability databases to trace security issues
The Common Vulnerabilities and Exposures (CVE) system is a popular reference system used to catalog disclosed vulnerabilities and exploits.
This dictionary of publicly known cybersecurity...
How to identify suspicious payments associated with ransomware
Due to the crucial role that financial institutions play in obtaining ransom payments, ransomware attacks are a growing concern for the financial sector. Typically,...
How to create an incident response plan
An incident response plan can make the difference between stopping a cyberattack and suffering critical data losses. These attacks rise annually, and organizations must...
Pros and cons of autonomous weapons systems
Autonomous weapons systems first appeared in science fiction movies, but in recent years, they have entered engineering laboratories and the battlefield. These are weapons...
Common trends in ransomware attacks to watch out for
Ransomware attacks are becoming more severe and sophisticated in all industries, particularly against governmental organizations, financial institutions, and healthcare facilities. The victims’ laxer cybersecurity...
Common security threats against Robot Operating Systems (ROS)
Cyber attacks are increasing threats to the integrity and smooth functioning of all Robot Operating Systems (ROS) at the core. To ensure the efficacy...
Why open source presents bigger security risks
The adoption of third-party open-source codes and application components such as frameworks and libraries within the public domain has increased significantly over the last...
True cost and impact of ransomware attacks on companies
Ransomware attacks have risen to the top of most organizations' security concerns. A growing number of cybercriminal groups now possess sophisticated malware thanks to...
Stress and mental health challenges among cybersecurity professionals
Cybersecurity professionals work in a constantly changing adversarial threat landscape and often must adhere to ever-changing industry mandates, a work environment akin to a...
Stealing passwords using thermal cameras and AI – Should we worry?
Is it possible to steal someone’s password using heat-detecting cameras and AI? Apparently, it is! Experts warn that criminals could use the thermal camera...
6 stages of penetration testing or ethical hacking
Penetration testing, also known as a pen test or ethical hacking, verifies the effects of particular security flaws or problematic procedures. It is a...
Benefits and limitations of penetration testing
Penetration testing, also referred to as pen tests, is more of an art than a science. It is the process of trying to gain...