Home
News
Hacks
Reports
Contact
Menu
Home
News
Hacks
Reports
Contact
13th March 2023
Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects
5th March 2023
Week in review: LastPass breach, GCP data exfiltration, UEFI bootkit
2nd March 2023
API Security Flaw Found in Booking.com Allowed Full Account Takeover
18th February 2023
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only
24th September 2021
Google Warns of a New Way Hackers Can Make Malware Undetectable on Windows
23rd August 2021
T-Mobile Breach Now Affects 54.6 Million Individuals
23rd August 2021
Why automated pentesting won’t fix the cybersecurity skills gap
16th August 2021
Half of US Hospitals Shut Down Networks Due to Ransomware
29th June 2021
Technology’s Complexity and Opacity Threaten Critical Infrastructure Security
17th May 2021
Most organizations fail to fix cloud misconfiguration issues in a timely manner
25th March 2021
Critical Cisco Jabber Bug Could Let Attackers Hack Remote Systems
11th March 2021
Fixing the Weakest Link — The Passwords — in Cybersecurity Today
8th January 2021
A crypto-mining botnet is now stealing Docker and AWS credentials
8th October 2020
Researchers Find Vulnerabilities in Microsoft Azure Cloud Service
31st August 2020
Five critical cloud security challenges and how to overcome them
21st July 2020
Everyone’s talking about microservices, who’s actually doing it?
11th June 2020
Bad habits and risky behaviors put corporate data at risk
11th June 2020
Top security risks for companies to address as cloud migration accelerates
11th June 2020
IBM blames ‘external’ network provider, incorrect routing, traffic flood for its two-hour cloud outage
8th June 2020
CPA Canada Breach Hits Over 300,000 Accountants
8th June 2020
Any Indian DigiLocker Account Could’ve Been Accessed Without Password
8th June 2020
Five signs a virtual CISO makes sense for your organization
5th June 2020
Pipped to the post: Google Cloud nabs Salesforce exec to lead UK and Ireland business
4th June 2020
Hackers hijack one of Coincheck’s domains for spear-phishing attacks
3rd June 2020
Many Exchange Servers Are Still Vulnerable to Remote Exploit
1st June 2020
Data on Indian Mobile Payments App Reportedly Exposed via Open S3 Bucket
1st June 2020
Mobile payment app BHIM leaked financial data of 7 million Indians
29th May 2020
The top three myths of cloud data protection – busted
29th May 2020
GitHub warns Java developers of new malware poisoning NetBeans projects
29th May 2020
NTT warns its Singapore cloud was hacked, Japanese customer data compromised
28th May 2020
A New Free Monitoring Tool to Measure Your Dark Web Exposure
23rd May 2020
Hackers leak data of 29 million Indian job seekers for download
23rd May 2020
Chrome: 70% of all security bugs are memory safety issues
22nd May 2020
Personal data of 12 million Facebook users exposed online
22nd May 2020
Hackers deface 1000+ Israeli websites in attempt to get webcam access
22nd May 2020
Ransomware deploys virtual machines to hide itself from antivirus software
19th May 2020
Records with data on 129 million Russian car owners sold on dark web
19th May 2020
Verizon’s data breach report highlights how unsecured cloud storage opens door to attacks
6th May 2020
Details of 44m Pakistani mobile users leaked online, part of bigger 115m cache
4th May 2020
Hackers exploit vulnerability to leak The Last of Us 2 spoiler video
2nd May 2020
Clouds need containers, and Containers-as-a-Service smooths the way
1st May 2020
Python ETL vs. ETL Tools
1st May 2020
New Updates for Windows Virtual Desktop including Admin Portal
27th April 2020
Cloud Services Are the New Critical Infrastructure. Can We Rely on Them?
27th April 2020
Vulnerability allowed hijacking of Microsoft Teams account with a GIF
23rd April 2020
The Evolving Threat of Credential Stuffing
23rd April 2020
Web shell malware continues to evade many security tools
23rd April 2020
Google unveils secure remote access service to unburden enterprise VPNs
23rd April 2020
CS:GO & Team Fortress 2 source code leaked – Virus alert for TF2
22nd April 2020
NetApp to make stateful applications easier to do in Kubernetes
22nd April 2020
Smart IoT home hubs vulnerable to remote code execution attacks
21st April 2020
Netflix’s Q1 shines, highlights company’s technology prowess
21st April 2020
Here comes Red Hat Enterprise Linux 8.2
21st April 2020
Google wants to make it easier to analyse health data in the cloud
21st April 2020
Here’s a list of all the ransomware gangs who will steal and leak your data if you don’t pay
21st April 2020
Cisco expands Google Cloud partnership with new SD-WAN cloud hub
20th April 2020
Alibaba says to invest $28 billion in cloud computing services
17th April 2020
Why SaaS opens the door to so many cyber threats (and how to make it safer)
15th April 2020
NeuVector adds to container security platform, automates end-to-end vulnerability management
10th April 2020
Number of VMware Virtual Cloud Network customers now exceeds 15,000
9th April 2020
Cloudflare dumps Google’s reCAPTCHA, moves to hCaptcha as free ride ends (and something about privacy)
8th April 2020
Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild
3rd April 2020
Ping Identity PingID multi-factor authentication now available in AWS Marketplace
2nd April 2020
Google changes course, proposes proprietary in-app purchase API as web standard
1st April 2020
“World’s most secure online backup” provider exposes 135M records
31st March 2020
Steering your network in the right direction with segmentation
30th March 2020
RDP and VPN use soars, increasing enterprise cyber risk
30th March 2020
RDP and VPN use soars, increasing enterprise cyber risk
30th March 2020
Why we need to secure IoT connections sooner than later
12th March 2020
Applying the 80/20 rule to cloud security
8th March 2020
Compare Active Directory to Azure Active Directory
8th March 2020
3 important trends in AI/ML you might be missing
6th March 2020
7 Cloud Attack Techniques You Should Worry About
28th February 2020
GhostCat: New High-Risk Vulnerability Affects Servers Running Apache Tomcat
28th February 2020
SentinelOne launches container and cloud-native workload protection offering
27th February 2020
Cloud computing: More costly, complicated and frustrating than expected – but still essential
27th February 2020
AWS Security Cookbook: Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS
27th February 2020
Kubernetes Security Leader Alcide Simplifies PCI and GDPR K8s Compliance
27th February 2020
Fortinet Introduces Self-Learning AI Appliance for Sub-Second Threat Detection
25th February 2020
Ensure Your Cloud Security Is as Modern as Your Business
24th February 2020
Solving the Cloud Data Security Conundrum
24th February 2020
Multi-Cloud Adoption: Time to Rethink Your Identity and Access Management
24th February 2020
Exponential growth breaking of Identity Management and Authentication Software market trends, Revenue, Gross Margin till 2025
24th February 2020
#Privacy: Public cloud a target for cybercriminals, study finds
24th February 2020
Small-to-midsize manufacturers face digital transformation constraints
24th February 2020
Episode 316 – SAP on Azure
24th February 2020
Building Snowpipe on Azure Blob Storage Using Azure Portal Web UI for Snowflake Data Warehouse
24th February 2020
AWS Serverless APIs & Apps – A Complete Introduction (Updated)
24th February 2020
Cloud Access Security Brokers (CASBs) Market Business Outlook, Top Manufacturers, Development Trends, Growth Projection and Forecast Research 2025
24th February 2020
Architecting a Successful SaaS: Understanding Public Cloud SaaS Models
24th February 2020
The Jellyfish-Inspired Database Under AWS Block Storage
23rd February 2020
Business continuity planning: 3 reasons why cloud tools are essential
22nd February 2020
Artificial intelligence set to jazz up software development and deployment
21st February 2020
Google sued by New Mexico over claims it spies on US students
20th February 2020
Red Hat OpenStack lives on in a new release
This website uses cookies to ensure you get the best experience on our website.
I understand
contact THE HUMAN ERROR
For further information on how The Human Error can help you. Fill out some details below, or give us a call.
Tel: 03300 417126
Name
Email
Company
Phone
Please Select Your Area of Focus?
Please Select Your Area of Focus?
3rd Party Access
Automate Pen Test Infrastructure & Cloud
Automate Pen Test Applications & Microservices
Data Sovereignty
Cyber Training
Data Encryption
Automated SOC
Cloud Access Rights
Cyber Workshops & Strategy
Message
Options
Send me a Free Printed Brochure.
Please Give Me a Call.
Send
Facebook
Twitter
Youtube
YOU HAVE
YOU NEED
SHINE A LIGHT ON ALL THREATS.
See All The Gaps.
ALERTS IN SECONDS.
Features:
Dark Threat Hunting
Policy Hardening
IOT & Shadow IT reporting
Detects "In Progress" Attacks
Alerts On Insider Threats
Installs in minutes
Request Your FREE Trial
70,000 Thoughts a day.
We Make Mistakes.