Ways to Secure Your Linux VPS so You Don’t Get Hacked
Security matters and the more serious, potent, and ambitious your web project is, the more attention you have to pay to security. If you have opted for Linux VPS, thisRead More →
Security matters and the more serious, potent, and ambitious your web project is, the more attention you have to pay to security. If you have opted for Linux VPS, thisRead More →
Applied Programming Interfaces (API) are an essential component of most modern programs and applications. In fact, cloud applications and mobile applications now rely heavily on APIs because they are designedRead More →
Microsoft has surprised key parts of the security community with its decision to quietly reverse course and allow untrusted macros to open by default in Word and other Office applications.Read More →
Fortinet, an American multinational corporation headquartered in Sunnyvale, California. The company develops and sells cybersecurity solutions, such as physical firewalls, antivirus software, intrusion prevention systems, and endpoint security components. FortinetRead More →
OpenSSL is a famous cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. It allows generating RSA private keysRead More →
Marriott hotel chain suffered a data breach , as it reported that hackers stole more than 20 gigabytes of confidential data, between clients and internal processes. The incident, first reportedRead More →
The Django project, an open source web framework based on Python, has fixed a high severity vulnerability in its latest versions. Identified as CVE-2022-34265, the potential SQL injection vulnerability existsRead More →
Iranian media has reported that Iranian hackers managed to take control of servers of the Israel Metro. Sabereen News Telegram channel, said the “huge” cyberattack targeted the operating systems andRead More →
A HackerOne employee had improperly accessed vulnerability reports submitted to the platform by security researchers’ for personal gain. The employee anonymously took these reports, somewhat modified them and disclosed theseRead More →
Broadcom published that software used by its storage networking company Brocade is affected by 9 important vulnerabilities, and the same vulnerabilities impact the SAN products of several major companies likeRead More →