Pwn2Own 2021, more than $1,500,000 in cash and prizes for contestants
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits....
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits....
It’s Data Privacy Day—the perennial event that many internet users may have never heard of, but have strong feelings and...
Our Lock and Code special episode on Data Privacy Day, featuring guests from Mozilla, DuckDuckGo, and Electronic Frontier Foundation can...
You can read our full-length blog here about the importance of Data Privacy Day and data privacy in general Today...
In a coordinated action, multiple law enforcement agencies have seized control of the Emotet botnet. Agencies from eight countries worked...
Cookie tracking is dying and Google needs a replacement. It’s betting on FLoC, an ad tracking technology that lets it...
Kirill Firsov admitted his guilt in trying to obtain secret information about the clients of a certain company for fraudulent...
Fraudsters are tricking people in the UK via fake Covid-19 vaccination invites, scammers are posing to be from the UK’s...
On Friday, 22 January, the Dutch police, and the Public Prosecution Service received warnings from the GGD that personal details...
VIPGames.com, a free platform with a sum of 56 accessible classic board and games like Hearts, Crazy Eights, Euchre, Dominoes,...
New and improved C# Implementation of Invoke-EDRChecker. Checks running processes, process metadata, Dlls loaded into your current process and each...
emba is being developed as a firmware scanner that analyses already-extracted Linux-based firmware images. It should help you to identify...
Web applications have been growing in complexity over the past several years, while also becoming the preferred method for attackers...
Let’s talk about cyber risk in the maritime and port setting to better understand Maritime Port cybersecurity. In order to...
Apple has addressed three zero-day vulnerabilities in its iOS operating system that have been exploited in the wild. Apple has...
CVE-2021-3156 Sudo vulnerability has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one...
Security vendors Fidelis, Mimecast, Palo Alto Networks, and Qualys revealed that were also impacted by SolarWinds supply chain attack The...
Threat Report Portugal Q4 2020: Data related to Phishing and malware attacks based on the Portuguese Abuse Open Feed 0xSI_f33d. The...
How to manually test for CVE-2021-3156? Try using the following command. sudoedit -s '\' perl -e 'print "A" x 65536'...
The owners of the Telegram channels noted that scammers under the guise of advertising offers send malicious files." In particular,...
Security firm Radware uncovered the threat actors' campaign named 'distributed denial-of-service' (DDoS). This campaign was launched to target the same...
Image SourceMachine Learning is a core building block in the field of Data Science and Artificial Intelligence. As we all...
The Australian Cyber Security Centre is on high alert for the vulnerability lately. The Australian corporate regulator has been the...
The WebsitePlanet research group in collaboration with Security Researcher Jeremiah Fowler found a non-password protected database that contained more than...