4 Key Points Towards Sensible Security Posture Optimization
The attack on Ukraine has been in the news for weeks, but one thing not many have paid attention to is the escalation in cyber warfare. Cyberattacks surged as Russia’sRead More →
The attack on Ukraine has been in the news for weeks, but one thing not many have paid attention to is the escalation in cyber warfare. Cyberattacks surged as Russia’sRead More →
Cybersecurity specialists from Akamai reported the detection of a malicious campaign based on the abuse of Universal Plug and Play (UPnP) protocols in order to hack routers and use themRead More →
Experts recently discovered a set of critical vulnerabilities that could allow threat actors to compromise millions of Internet connected devices, including deployments used in hospitals and other critical services. DubbedRead More →
Authorities in the Indian state of Haryana have announced the arrest of two individuals accused of falsifying hundreds of birth and death certificates by hacking into various government websites. TheRead More →
The Open Web Application Security Project (OWASP) is celebrating its second decade of life and a 24-hour webinar has been organized to commemorate the occasion, present various security topics. OneRead More →
A group of researchers discovered three different groups of threat actors linked to the Chinese government using previously seen Microsoft Exchange exploits to deploy powerful cyberattacks. These groups were identifiedRead More →
An Iran-based hacking group has spent about a year and a half operating a hacking campaign in which they pose as aerobics instructors in order to spy on and infectRead More →
A recent report claims that the vulnerability affecting Checkbox Survey, a tool ASP.NET to add survey functionality to websites, was exploited by a hacking group sponsored by the Chinese governmentRead More →
Tor is the most famous web browser which provides anonymity/ privacy over the internet. Many companies/ whistle blowers uses TOR for working anonymously. Some Hacking groups also uses TOR servicesRead More →
Bloodhound is a great visual tool that shows the relationship between multiple Active Directory objects and allows you to quickly evaluate the possibility of compromising relevant information, as well asRead More →