Home Security

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

DevSecOps and the shift left in security: how Semmle is supporting software developers [Podcast]

0
Software security has been 'shifting left' in recent years. Thanks to movements like Agile and Dev(Sec)Ops, software developers are finding that they have to...

How Chaos Engineering can help predict and prevent cyber-attacks preemptively

0
It's no surprise that cybersecurity has become a major priority for global businesses of all sizes, often employing a dedicated IT team to focus...
vulnerability

An unpatched vulnerability in NSA’s Ghidra allows a remote attacker to compromise exposed systems

0
On September 28, the National Security Agency revealed a vulnerability in Ghidra, a free, open-source software reverse-engineering tool. The NSA released the Ghidra toolkit...
The best penetration testing tools for ethical hackers

Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking...

0
On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the...
CWE Top 25 list

MITRE’s 2019 CWE Top 25 most dangerous software errors list released

0
Two days ago, the Cybersecurity and Infrastructure Security Agency (CISA) announced MITRE’s 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors list....
simjacker

A new Stuxnet-level vulnerability named Simjacker used to secretly spy over mobile phones in...

0
Updated: On September 27, a few researchers from the Security Research Labs (SRLabs) released five key research findings based on the extent of Simjacker...
Top 5 cybersecurity assessment tools for networking professionals

Endpoint protection, hardening, and containment strategies for ransomware attack protection: CISA recommended FireEye report...

0
Last week, the Cybersecurity and Infrastructure Security Agency (CISA) shared some strategies with users and organizations to prevent, mitigate, and recover against ransomware. They...
vulnerability

Security researcher publicly releases second Steam zero-day after being banned from Valve’s bug bounty...

0
Updated with Valve’s response: Valve, in a statement on August 22, said that its HackerOne bug bounty program, should not have turned away Kravets...
canon dslr

Vulnerabilities in the Picture Transfer Protocol (PTP) allows researchers to inject ransomware in Canon’s...

0
At the DefCon 27, Eyal Itkin, a vulnerability researcher at Check Point Software Technologies, demonstrated how vulnerabilities in the Picture Transfer Protocol (PTP) allowed...

“Developers need to say no” – Elliot Alderson on the FaceApp controversy in a...

0
Last month there was a huge furore around FaceApp, the mobile application that ages your photographs to show you what you might look like...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews