Zephyr: The Linux operating system for IoT devices
Linux tries to address the need for an operating system of its own for IoT equipment Linux Foundation has just presented the so-called ‘Zephyr Project’, which consists of an operatingRead More →
Linux tries to address the need for an operating system of its own for IoT equipment Linux Foundation has just presented the so-called ‘Zephyr Project’, which consists of an operatingRead More →
Hackers implant backdoors on ‘Infrastructure as a Service’ hardware servers Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of a new vulnerabilityRead More →
Vulnerabilities were patched months ago, although there are still exposed users Network security and ethical hacking specialists from the International Institute of Cyber Security report the finding of two criticalRead More →
This vulnerability can be exploited only by local attackers Malicious hackers could exploit a privilege escalation vulnerability in Cisco Webex Meetings for Windows operating systems to execute arbitrary commands usingRead More →
Two old vulnerabilities were exploited, allegedly by Chinese hackers The Cisco network security and ethical hacking teams recently detected intrusions from malicious hackers by targeting Elasticsearch clusters to exploit previouslyRead More →
Company officials report that unknown actors got access to data using credentials obtained in other incidents According to network security and ethical hacking specialists from the International Institute of CyberRead More →
Google experts consider these vulnerabilities to be inherent in modern processors design According to network security and ethical hacking specialists from the International Institute of Cyber Security, the vulnerabilities SpectreRead More →
Hackers accessed personal data from more than 160 million users According to network security and ethical hacking experts from the International Institute of Cyber Security, Dubsmash, the popular video app,Read More →
The Domain Name System is vulnerable to multiple cyberattacks, so the organization has requested to implement better security measures According to network security and ethical hacking experts from the InternationalRead More →
As per ethical hacking experts, Internet is full of anonymous things. Lot of users surf internet using their native network operators. But if you talk about privacy concern some individualsRead More →
Some versions of the content management system present a critical vulnerability that leaves them exposed to remote code execution attacks Network security and ethical hacking specialists from the International InstituteRead More →
Multiple victims, mostly young people between the ages of 18 and 25, are invited to invest through an ad in the app; then the scammers disappear British authorities report anRead More →
In this phishing campaign the attackers are impersonating Google in attacks against banking institutions and their users Network security and ethical hacking specialists from the International Institute of Cyber SecurityRead More →
The vulnerability could have been used to extract messages from users and to inject malicious code their outgoing messages Network security and ethical hacking specialists from the International Institute ofRead More →
These new techniques allow the use of communication intercepting devices again During a recent event dedicated to network security experts, a team of researchers unveiled a set of vulnerabilities inRead More →
A tool available to any user OnionShare appeared in 2017 and, according to network security specialists from the International Institute of Cyber Security, allowed any user to share files inRead More →
cybersecurity #infosec #IIS #MicrosoftSystem administrators are recommended to update as soon as possible According to network security and ethical hacking specialists from the International Instiute of Cyber Security, the MicrosoftRead More →
Nowdays internal & external networks are not secure, explain ethical hacking researchers. That’s why various security policies are implemented on networking level are implemented. These policies still need many newRead More →
The company failed to mention that its home security system has an integrated microphone Network security and ethical hacking specialists from the International Institute of Cyber Security report a newRead More →
Some users consider that these cameras can compromise their privacy Recently, a photograph showing a camera on one of the TV screens of a Singapore Airlines plane became viral, asRead More →