Security news that informs and inspires

2376 articles by

Uprising in the Valley: When Bug Bounties Went Boom, Part Two

Following the success of the bounty programs started by companies such as iDefense, Zero Day Initiative, and Mozilla, technology companies and platform providers began rolling out bounties of their own. Among the big players to enter the game were Google, Facebook, Yahoo, and eventually, Microsoft.

Bug Bounty

Lawyers, Bugs, and Money: When Bug Bounties Went Boom

Bug bounties have grown from a niche idea to encourage independent security research into a massive business and a legitimate career path for bug hunters in less than 15 years. This is the story of the hackers who made that happen.

Bug Bounty

Cybercriminals Beginning to Leverage Proxyware for Malware Installation

Some cybercrime groups are using trojaned proxyware installers to gain a foothold on victim machines and install malware and cryptominers.

Malware, Cryptomining

Tech Companies Pledge Billions for Critical Infrastructure Security Upgrades, Training

Google, Microsoft and IBM plan to spend billions of dollars in the next five years to aid the Biden administration's move to shore up government and critical infrastructure security.

Government

New Tools Target Pulse Connect Secure Flaws

CISA has released analyses of five new pieces of malware being used in attacks against known bugs in Pulse Connect Secure appliances.

Vpn, CISA