PEACHPIT: Turning victim devices into threats
Learn how organised threat operation BADBOX is expanding its attack surface through ad fraud on Android and iOS.
Read MoreLearn how organised threat operation BADBOX is expanding its attack surface through ad fraud on Android and iOS.
Read MoreIn the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreMegan Samford discusses her work on ICS4ICS, improving ICS' emergency response effort and its possible presence in the field of cybersecurity.
Read MoreWelcome to the new 56 cyber warriors who joined us last week. 🥳 Each week, we'll be sharing insights
Read More... and this is the data point he gave us. Experts argue that cybersecurity is a recession proof industry, but is it really?
Read More