Justdial leaks personal data of 100 million users… Again
A recent report states that Justdial, one of the largest service companies in India, has suffered a data breach that led to the exposure of confidential records of more thanRead More →
A recent report states that Justdial, one of the largest service companies in India, has suffered a data breach that led to the exposure of confidential records of more thanRead More →
After multiple reports and rumors, Transnet Port Terminals (TPT) confirmed a cyberattack that affected its entire it infrastructure. As some will recall, Transnet Group is the operator of state portsRead More →
A recent report claims that the vulnerability affecting Checkbox Survey, a tool ASP.NET to add survey functionality to websites, was exploited by a hacking group sponsored by the Chinese governmentRead More →
Cybersecurity specialists report the discovery of two critical vulnerabilities in Asterisk, a popular open source Voice over Internet Protocol (VoIP) telephony solution that provides call center functions. According to theRead More →
Cybersecurity specialists report the discovery of multiple vulnerabilities in biometric access control devices developed by French multinational IDEMIA. According to the report, successful exploitation of these vulnerabilities would allow threatRead More →
French cybersecurity specialist Gilles Lionel reported the discovery of a serious vulnerability in the Windows operating system that would allow threat actors to arbitrarily authenticate to remote Windows servers inRead More →
Tor is the most famous web browser which provides anonymity/ privacy over the internet. Many companies/ whistle blowers uses TOR for working anonymously. Some Hacking groups also uses TOR servicesRead More →
Information gathering phase shows how an pentester should prepare for his next phases. Because in this phase pentester have to collect information about their target as much possible. Their areRead More →
Wireless Networks Wireless network which enables end-point devices to communicate with internet by connecting to an AP device. Wiresless device are also referred as WLAN devices. Accessing Wireless Networks YouRead More →
Cybersecurity specialists report the detection of a critical vulnerability in Fail2ban, an application written in Python for the prevention of intrusions in a given system. According to the report, thisRead More →