Data breach at Nordstrom
The incident has compromised the security of the company employees’ information Nordstrom, the luxurious department stores chain, is in the process of notifying its employees that their personal information couldRead More →
The incident has compromised the security of the company employees’ information Nordstrom, the luxurious department stores chain, is in the process of notifying its employees that their personal information couldRead More →
The company recommends users to update their systems as soon as possible, because among the errors found there are zero-day vulnerabilities Last Tuesday Microsoft has launched a new round ofRead More →
ATM pentests showed alarming results for banks ATMs are vulnerable to a number of basic attack techniques that would allow any hacker with minimal knowledge and resources to steal thousandsRead More →
What is W3af? W3af is a tool used in auditing and exploitation of web applications. It’s an open source python based web vulnerability scanner. The tool also has GUI version.Read More →
DNSTRACER:- Dnstracer is a Domain Name Server Information gathering tool, which extract unique DNS information about a domain. It extracts different types of DNS records like NS, MX, A, AAAA,Read More →
What is DIRBUSTER? Dirbuster/ Directory Traversal Attacks where attacker can use dictionary of word list to find hidden or not hidden directories and files on the target web application &Read More →
People ignore where or how authorities install surveillance cameras The Drug Enforcement Administration (DEA) and the Immigration and Customs Enforcement Service (ICE) have installed an undisclosed number of covert surveillance cameras onRead More →
The airline admitted that it was under attack for three months and took six months to disclose the data theft In late October, Cathay Pacific, Hong Kong’s official airline, announced thatRead More →
The traffic was hijacked through Russia, China and Nigeria A BGP leak caused the lack of availability of Google service on Monday; the traffic was redirected through Russia, China andRead More →
Some considerations on controller and processor responsibilities and other concepts present in the European data protection law, such as DPIA and DPO The application of the European Union’s General Data ProtectionRead More →