Category: Uncategorized

Uncategorized

Cybersecurity Skills Shortage Tops Four Million

Global IT security skills shortages have now surpassed four million, according to (ISC)2. The certifications organization compiled its latest Cybersecurity Workforce Study from interviews with over 3200 security professionals around the world. The number of unfilled positions now stands at 4.07 million professionals, up from 2.93 million this time last year. This includes 561,000 in North America and…

Uncategorized

New cyber security guide is the first to gather global expertise

Some of the world’s leading experts in cyber security have pooled their academic and industry insights to produce an authoritative guide that could help organisations to future proof their resources. The guide, the first of its kind, will also help expand the capabilities of those who will be at the forefront of tackling the challenges…

Uncategorized

Indian nuclear power plant’s network was hacked, officials confirm

After initial denial, company says report of “malware in system” is correct. The Nuclear Power Corporation of India Limited (NPCIL) has acknowledged today that malware attributed by others to North Korean state actors had been found on the administrative network of the Kudankulam Nuclear Power Plant (KKNPP). The admission comes a day after the company issued…

Uncategorized

40 Stunning Hacking Statistics that Concern Us All in 2019

Have you ever considered that nearly every electronic device can be hacked? I know I have. Today we’ll look at some hacking statistics to illustrate the impact of hackers’ activities in modern society. Naturally, hacks are a great concern for website owners – that’s why all reviews here on Hosting Tribunal focus heavily on security…

Uncategorized

Cyber threats to consider this Cyber Security Month

The biggest cyber threats, their consequences and how to protect yourself and your businesses. (Image credit: Image source: Shutterstock/jijomathaidesigners) October marks European Cyber Security Month – an awareness campaign aiming to promote the importance of information security and highlighting the simple steps that can be taken to protect data, whether personal, financial and/or professional. This…

Uncategorized

Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking in IoT

On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the importance of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. They have focussed on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerabilities in exchange for…

Uncategorized

The challenges of being startup from unrecognized countries

Over the past years I have been attending a number of conferences, training’s, programs and scholarships, even before I co-founded my own Cyber Security and Privacy community in Kosovo, we hosted international conferences, tens of workshops ranked as TOP 5 cyber conferences that must be attended in Europe (EC-COUNCIL). I used to meet tons of…

Uncategorized

FINDBUG.IO- Ethical Hackers oriented Crowd Penetration Testing platform is getting attention!

The DAY one after the newest Crowd Penetration Testing platform has been launched we received a hundred of applicants and a lot of motivational reviews. We would like to THANK all those you tried a little bit harder to pass the CTF(among TOP 20 security researchers worldwide) as the first step toward application review. We…

Uncategorized

Difference between Public and Private programs?

The main difference is on hackers involved, when you go public all of our registered ethical hackers can view your program otherwise Private Programs you can decide security researchers you want to involve based on their Hacker Trust, Ranks and Skills. Private Programs are linked to your account plan based on that you have limited…