Cybersecurity

General Cybersecurity News

Discover cybersecurity news articles with the latest tips and trends. Learn about the ins and outs of cybersecurity threats, as these threats represent a fundamental issue that affects almost all aspects of our modern lives.


#Hackers #hackersummercamp #BlackHat2022 #DEFCON30 #cybersecurity
Hacker, Security, Vulnerability, Grey hat, Black hat, Computer security

@CyberScoopNews shared
On Aug 9, 2022
.@HarriHursti, co-organizer of the @VotingVillageDC, told CyberScoop that this year’s Voting Village has two themes: #Hackers fighting misinformation and how professionals conduct forensic study of electronics, reports @SuzanneMSmalley and @AJVicens. https://t.co/eauCb1gmBb
Open

What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas

Black Hat, DEF CON and BSidesLV take place this year amid a backdrop of COVID, cyberwarfare in Ukraine and digital attacks on Taiwan.

@CyberScoopNews shared
On Aug 9, 2022
.@HarriHursti, co-organizer of the @VotingVillageDC, told CyberScoop that this year’s Voting Village has two themes: #Hackers fighting misinformation and how professionals conduct forensic study of electronics, reports @SuzanneMSmalley and @AJVicens. https://t.co/eauCb1gmBb
Open
What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas

What to watch for as 'Hacker Summer Camp' gets underway in Las Vegas

Black Hat, DEF CON and BSidesLV take place this year amid a backdrop of COVID, cyberwarfare in Ukraine and digital attacks on Taiwan.

Grey hat

Grey hat

The term "grey hat", alternatively spelled as "greyhat" or "gray hat", refers to a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, ...

A marquee week for cybersecurity in Vegas

A marquee week for cybersecurity in Vegas

Federal cybersecurity officials and industry experts will make the annual pilgrimage to Las Vegas this week for the Black Hat and DEFCON conferences.

Commentary: A safer online playground powered by hackers

Commentary: A safer online playground powered by hackers

What businesses and government bodies need is a paradigm shift to expose cybersecurity systems to the outside and enlist hackers to exploit ...

Exploring the dynamics of the attacker economy

Exploring the dynamics of the attacker economy

Global software companies are increasingly turning to attackers for help identifying security vulnerabilities in their offerings, and they’re not alone.

Microsoft Pays Top Dollar for Bug Bounties

Microsoft Pays Top Dollar for Bug Bounties

Hackers who can expose flaws in the security of software can receive a large reward from Microsoft.

What is ethical hacking? White hat hackers explained

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

What We're Looking Forward to at Black Hat, DEF CON, and BSidesLV 2022

​Here's a sneak peek of what we have planned from August 9-12 at the all-star lineup of cybersecurity sessions in Las Vegas, including Black Hat 2022.

Q&A with Grant McCracken, Bugcrowd: “You might be thinking, do I want people to hack me? The answer is yes!”

Q&A with Grant McCracken, Bugcrowd: “You might be thinking, do I want people to hack me? The answer is yes!”

We interviewed Grant McCracken, Bugcrowd's Sr. Manager of Solutions Architecture, to discuss crowdsourced security and the rise of bug bounty programs.

Calling a Hack an Exploit Minimizes Human Error

Calling a Hack an Exploit Minimizes Human Error

After the Wormhole event, it's worth asking about crypto's reliance on and trust in code.

Cybersecurity Spotlight: Black, Gray, & White Hat Hackers

Cybersecurity Spotlight: Black, Gray, & White Hat Hackers

This Cybersecurity Spotlight defines black, gray, & white hat hackers while highlighting why it matters to election officials and how election officials can lev

Imagine Yourself Being A Hacker [Beginner's Guide]

Imagine Yourself Being A Hacker [Beginner's Guide]

Make no mistake, the knowledge of hacking is different from a hacker. A hacker is a person, not the skill. And the use of any knowledge is a personal choice and that choice isn’t universal. ...

7 Ways Bugcrowd May Be the Best Security Solution Ever

7 Ways Bugcrowd May Be the Best Security Solution Ever

Hacker attacks are getting more sophisticated—and expensive—every day. But companies like Bugcrowd provide cost-effective, crowdsourced solutions. Find out how Bugcrowd can protect your ...

This 18-year-old’s hacking side hustle has earned him $100,000 — and it’s legal

This 18-year-old’s hacking side hustle has earned him $100,000 — and it’s legal

More companies are offering ‘bug bounties’ for enterprising hackers.

Ethical Hacking: Inside the World of White Hat Hackers

Ethical Hacking: Inside the World of White Hat Hackers

Companies have long played defense against cyber attacks. With the help of ethical hackers, they're taking more proactive measures.

Hackers in the Age of Bounty Programs

Hackers in the Age of Bounty Programs

The popular culture has depicted hackers as evildoers in movies, in TV series and even in the primetime news.

The Truth about Hackers, in Black and White (and Grey)

The Truth about Hackers, in Black and White (and Grey)

Despite what you may have heard, not all hackers have evil goals in mind. Find out about the different subtypes of hackers and what motivates them to hack in the first place.

How to become a cybersecurity hero: An interview with a white hat hacker

How to become a cybersecurity hero: An interview with a white hat hacker

Want to be a hacker? Learn how Avast CISO, Jaya Baloo, became a white hat hacker to take on cybercriminals and help keep the internet safe.

Press Archive

Press Archive

DEF CON through the window of the press, an archive collecting DEF CON coverage over the years.

How Many Types of Hackers Are There?

How Many Types of Hackers Are There?

Learn about the most common types of cyber attacks & hacking techniques used to gain authorized access and what you can do to protect yourself against them.