Experts point out that the recent data breach that had impacted Cathay Pacific exposes a gap in Hong Kong laws. The Hong...
A security researcher has discovered several critical vulnerabilities in one of the most popular embedded real-time operating systems—called FreeRTOS—and its other variants,...
To run flawfinder, simply give flawfinder a list of directories or files. For each directory given, all files that have C/C++ filename...
A Python script for AWS S3 bucket enumeration. Inspired by a conversation with Instacart’s @nickelser on HackerOne, I’ve optimized and published Sandcastle – a...
The lawsuit is due to the flaws in the identification cards issued by the company The Estonian authorities have taken legal action against the security company Gemalto, filing a lawsuit for €152M after security failures in citizen identification cards issued...
Rafay Baloch has reported Vulnerability in Edge and Safari Browsers that Allows Address Bar Exploitation. Nowadays the phishing attacks have become increasingly...
A lawsuit has been filed against tech giant Google, accusing Google of tracking locations even when the “Location History” setting is turned...
This year’s Defcon witnessed many interesting events, including the hacking of voting machines by 11-year-olds and macOS’s vulnerabilities to grant permissions to...
Spreading fake news through WhatsApp was never so easy before. According to the latest research from Check Point security firm, WhatsApp users...
Enterprise network security researchers found dozens of flaws that could expose smart home devices to attacks Enterprise network security experts discovered 20...
Scout2 is a security tool that lets AWS administrators assess their environment’s security posture. Using the AWS API, Scout2 gathers configuration data...
Another day, another security fix released by Intel. In a blog post, Positive Technologies has detailed four different vulnerabilities found in the...
Email users who use PGP (based on OpenPGP) and S/MIME to encrypt and decrypt their communications are at “immediate risk.” The reason...
Modern-day vehicles have become overly digitized for the sake of offering advanced technicality to drivers. However, being digital cannot ensure optimal security...
Critical Flaws in Intel’s Remote Keyboard App for Android Lead to its Discontinuation. As is the norm with security researchers, when bugs...
Last week, the Isreal-based security company CTS labs was trending in the news for disclosing 13 critical vulnerabilities in AMD’s Ryzen and...
The bug bounty program will remain open until December 31st, 2018. Recently, the identification of serious CPU flaws called Spectre and Meltdown shook...
Researchers at the Purdue University and the University of Iowa, USA, have managed to break the key 4G LTE protocols for generation...
A flight of new research papers show 4G LTE networks can be exploited for all sorts of badness. There have been lots...
Another AWS Bucket exposed to the public. This time the AWS Bucket belonged to Birst. A cyber security team have discovered a...
Hackers could be close to developing malware that exploits flaws, suggests a German cybersecurity firm. AV-Test, an independent German antivirus testing and...