5 Open source projects that will open doors
Discover five top open source projects that you can use to improve your cybersecurity skills.
Read MoreDiscover five top open source projects that you can use to improve your cybersecurity skills.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreWe interviewed Ilyass Rahmani (Co-Founder and CTO at NearSecure) to find out how he launched his career in cybersecurity, and uncover the biggest IT threats to companies right now.
Read MoreGulfIT doesn’t just distribute cybersecurity solutions. They build vendor-specific support teams to ensure that clients implement effective protection, and offer training to help organisations make better security decisions.
Read MoreWelcome to Black Hat MEA's new content platform. Each week we bring you insider insights from our community
Read MoreCurrently, generative AI models (including ChatGPT) can be used to enhance the complexity and speed of malicious cyber activity, and cut costs for criminals. But could it generate new cyberthreats in the future?
Read MoreWith an explosion in the use of IoTs and a spike in the number of people working remotely, cyber criminals have a big (and growing) attack field to work on.
Read MoreWhile syscalls and Windows have exploded in popularity, permitting offensive security tools to weaponize direct Windows syscalls to avoid EDR, they have virtually never been utilized in the context of shellcode, except for Egghunters, a specialized shellcode that uses only one syscall.
Read More