Tag: EN

How to Conduct a Secure Code Review – Tools and Techniques

Secure code review represents a critical security practice that systematically examines software source code to identify and remediate security vulnerabilities before they reach production environments. This comprehensive examination serves as a proactive defense mechanism, enabling development teams to detect security…

How to Use Threat Intelligence to Enhance Cybersecurity Operations

Threat intelligence represents a paradigm shift from reactive to proactive cybersecurity, providing organizations with actionable insights to detect, prevent, and respond to cyber threats more effectively. By leveraging structured data about current and emerging threats, security teams can make informed…

Microsoft Reveals Chinese State Hackers Exploiting SharePoint Flaws

Microsoft reveals Chinese state-backed hacker groups, including Linen Typhoon, Violet Typhoon, and Storm-2603, are exploiting SharePoint flaws, breaching over 100 organisations. Discover threat actors, their tactics and Microsoft’s urgent security guidance. This article has been indexed from Hackread – Latest…

The password that sank a 158-year-old business

The 2023 collapse of the 158-year old UK logistics company KNP resulted in the loss of 700 jobs. The devastating cyber attack that shuttered the company has returned to the spotlight this week with a BBC Panorama documentary examining the…

Majority of CISOs Lack Full Visibility Over APIs

New research by Salt Security has revealed that the majority of CISOs do not have full visibility over their API environments, despite recognition of the growing API attack surface. The 2025 Salt Security CISO Report found that while 73% of CISOs…