Security Loophole - Cybersecurity Magazine.

Unfiltered insights. In-depth analysis. Exclusive breakdowns.
Featured Stories
What Should Collaboration on Security Incidents Look Like?
Risk Management

What Should Collaboration on Security Incidents Look Like?

Companies are set to spend over $8 trillion in damage control costs this year – that’s a whole lot of…

Check Point Software • 6 days ago
Email Compliance & Security

The Hidden Cyber Threat: Emails That Were Never Sent

Your Dmarc 1 week ago
The Hidden Cyber Threat: Emails That Were Never Sent
SSL/TLS Security News

Trusting Cheap SSL Certificate Providers when Budget is Low

SSL Cert Shop 9 months ago

Latest News & Insights

VIEW ALL
Figure 1. Distribution of the domains reported by the FBI across ISPs. Illustration by WhoisXML API
Online Safety 9 months ago

Funnull Scam Infrastructure Revealed to Be 100,000 Domains Larger and Older Than Previously Reported

Following the U.S. government sanctions against the Philippines-based tech firm Funnull Technology Inc. (or Funnull for short) for its role in large-scale online scams, new…

WhoisXML API 5 min read
best-laptop-for-cybersecurity-top-picks-for-ethical-hackers-security-professionals
Penetration Testing - Latest News & Insights 1 year ago

Best Laptop for Cybersecurity: Top Picks for Ethical Hackers & Security Professionals

Selecting the right Laptop For Cybersecurity is one of the most critical decisions for cybersecurity professionals. Whether you are a CISO, penetration tester, ethical hacker,…

X-PHY
cybersecurity webinars
Upcoming Cyber Security Webinars 2 years ago

CybersecurityWebinars.com: Your Gateway to Essential InfoSec Knowledge

Cybersecurity Webinars (CSW) is excited to announce the launch of its new platform, offering a comprehensive resource for cybersecurity professionals. This user-friendly website provides free…

CSW 2 min read
Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program
The Library 2 years ago

Webinar: Managing Without Governing? Why Your Organization Needs a Management System to Govern Your Information Resilience Program

Most organizations have some kind of processes established for their day-to-day cyber security program, but most are missing the fact that while cyber security is…

SGS
How to Remove False Positive URL (VirusTotal)
Antivirus / Antimalware News 2 years ago

How to Remove False Positive URL (VirusTotal)

VirusTotal is a security platform where you can analyze suspicious files, websites, and URLs that may be malicious. When you submit a file or a…

SL
unmasking-the-dark-art-of-social-engineering-exploring-lesser-known-tactics
Latest Cyber Attacks 3 years ago

Unmasking the Dark Art of Social Engineering: Exploring Lesser-Known Tactics

Social engineering remains a common tool in cybercriminals’ arsenal in the rapidly evolving landscape of attack vectors for users and organizations. While phishing attacks have…

KnowBe4 8 min read
the-three-best-defenses-you-can-deploy-1
Latest Cyber Attacks 3 years ago

The Three Best Defenses You Can Deploy

Every computer defender is inundated with over a hundred cybersecurity controls they are supposed to deploy to make their environment at reduced risk of cyber…

KnowBe4 6 min read
Artificial Intelligence and the Future of the Human Race
Artificial Intelligence Security News 3 years ago

Artificial Intelligence and the Future of the Human Race

Some scientists are saying that AI will save the world. If this claim is valid, the main question is, at what cost? In 2023, 42%…

Indep. Journalist 4 min read
16 us hospitals offline due to ransomware attack
Latest Ransomware News 3 years ago

16 U.S. Hospitals Offline Due to Ransomware Attack

On 1st of August, Prospect Medical Holdings discovered a ransomware in their national network system.  Since then, their computer systems have been offline and the…

SL 1 min read