Hacking/Hackers/Penetration testers
Research: WAFs Easily Bypassed Using Parameter Pollution Technique
-
Making Pen Testing a Year-Round Cybersecurity Strength
-
Expanded ShinyHunters Collaborate with Scattered Spider
Findings come amid the emergence of a Telegram channel purportedly led by members of the ShinyHunters, Scattered Spider, and LAPSUS$ hacking groups.
-
Ten Things Learned from Government's Offensive Cyber Research
What are the clients of red team service providers concerned about when it comes to trends, offensive engagements and overall quality.
-
Inside the Adversarial Mindset: Embedding Red Team Tactics into Cybersecurity
-
GenAI Shaping Working Practises, Top Risks for Leaders
-
Cyber Breaches Survey Analysis - Approaches to Cybersecurity
-
Cyber Security Challenge: Participants and Competitors on Experience and Careers
Speaking to three of the participants in the Cyber Security Challenge on their experiences and careers since.
-
The Legacy of the Cyber Security Challenge
The Cyber Security Challenge will cease operations in a few weeks, but what did it achieve in its 15 year existence, and what do those who worked, ran and volunteered for it feel looking back?
-
No more items to load
Load moreAn error occurred trying to play the stream. Please reload the page and try again.
CloseSign up benefits
Registering with SC Media is 100% free. Join tens of thousands of cybersecurity leaders today and gain access to the latest analysis shaping the global infosec agenda.
- Weekly newsletters featuring industry-leading insight
- Access to free cyber expert webinars and videos
- Privileged viewership of special reports, such as the Annual Cyber Salary Survey and Women of Influence