Interesting Reads

Read up on Cyber Security topics and reports

We have gathered a selection of articles, reports, and resources for you to explore the world of cybersecurity from various perspectives.


The use of AI in cybersecurity enables unexpected behaviour to be discovered quicker through the automated aggregation and dynamic evaluation of multiple sources of security data,

Reconnaissance is essential for every penetration tester or security engineer working on a pen-testing project. Knowing the right tools to find or discover specific information makes it easy for the pentester to learn more about the target.

The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS) attacks, accounting for half of all its HTTP traffic.


1st September 2023 marks International Women in Cyber Day (IWCD) and continues its work to elevate the achievements of women within cyber and cybersecurity spaces.

Social Engineering has been on the front burner of security issues for a while. It has been discussed extensively by industry experts. Yet, not many fully realize the potential danger it poses and how very dangerous it can be.

Dropbox, the popular file-sharing service, is used around the globe. Cybercriminals have figured out that they can use it to create documents that host phishing material. 


The National Institute of Standards and Technology (NIST) has made a significant move in introducing its groundbreaking AI Risk Management Framework (AI RMF). Designed to empower organizations and individuals with comprehensive risk management guidance, the AI RMF aims to create a world where AI can thrive responsibly.

Today’s IT professionals must have at least a basic understanding of cybersecurity in order to excel in their careers. It’s critical to know about and protect against possible internal and external cyber-attacks. This article is an overview of the many layers of vulnerability in security and what IT professionals need to know to stay ahead.

In this article, we will discuss the recent Honda e-commerce platform attack, how it happened, and its impact on the business and its clients. In addition, to the importance of application security testing, we will also discuss the different areas of vulnerability testing and its various phases.


Security is not just a technical issue, but a cultural one. Creating a culture of security responsibility means fostering a mindset and a behavior that values and protects the confidentiality, integrity, and availability of data and systems.

Malware, or malicious software, is a constant threat to the security and privacy of your devices, data, and networks.
In this article, we will discuss some of the best ways to keep up with the latest malware developments and how to prevent or mitigate their impact.

While large corporations often dominate the headlines regarding cyber threats, small businesses are not immune to such risks. In fact, they are increasingly becoming attractive targets for cybercriminals, so small businesses need to get serious about cybersecurity sooner rather than later.


Many organizations today face cloud security breaches in their daily activities. They try to find proper solutions to keep their businesses safe. Here, IAM (Identity and Access Management) shows up. Let’s take a close look at IAM.

In this article, we will explain the key steps and factors to consider when performing a risk assessment and notifying the relevant authorities and data subjects.

In this article, you will learn about some of the common challenges and threats of cloud environments and how to test them using various tools and techniques.


White hat hackers serve as a crucial line of cyber defense, working to identify and mitigate potential threats before malicious actors can exploit them.
In this exclusive Q&A, we spoke with seasoned white hat hacker Gilit Saporta, Director of Analytics for DoubleVerify’s Fraud Lab.

In this article, we will share some tips on how to network and find mentors in the cybersecurity community, and how to benefit from their guidance and support.

Recently, the RSA conference took place in San Francisco, where experts in information security gathered to discuss the latest developments in the cybersecurity landscape.

May 3, 2023


The EU wants to strengthen the principle of equal pay for equal work between men and women through new EU rules on pay transparency.

Operational Coordinator Women4cyber Foundation answers some questions about cybersecurity.
April 6, 2023

The World Economic Forum’s Global Cybersecurity Outlook 2023, in collaboration with Accenture, examines the cybersecurity trends that will impact our economies and societies in the year to come. Find the latest research from the World Economic Forum on how the world is responding to cyber threats and what leaders can do to secure their organisations.


The European Commission has published the 2023-24 work programme for the Digital Europe funding programme, setting out key tech policy focus areas for the upcoming years, with a dedicated section for cybersecurity.

March 27, 2023

The Annual Pentest Report provides valuable insights into the current state of cybersecurity and the latest trends and vulnerabilities. It is a must-read for anyone interested in enhancing their cybersecurity posture and keeping up to date with the latest developments in the field.


The European Parliament’s Industry committee voted Thursday (9 March) in favour of MEP Henna Virkkunen’s draft report proposing introducing common cybersecurity standards across EU institutions, paving the way for starting trilogue negotiations.

March 9, 2023

Cyber Security Podcasts

Cyber Security Sauna

The Cyber Security Sauna podcast brings you expert guests with sizzling insight into the latest information security trends and topics.

Listen here

Trust Me, I'm Certified

Trust Me, I’m Certified provides practical tips for combatting feelings of not belonging in the cyber workplace from distinguished, helping you to overcome Imposter Syndrome.

Listen here

Darknet Diaries

Darknet Diaries is about hackers, breaches, shadow government activity, hacktivism, cybercrime, and all the things that dwell on the hidden parts of the network.

Listen here

CyberWire Daily

Published each weekday, the program also included interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

Listen here