Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could...
I hope you had biggest, happiest and craziest New Year celebration, but now it’s time to come back at work and immediately...
The Indian Government has suggested that amendments to the Information Technology (IT) Act should be made to curb the spreading of fake...
Adobe is closing out this year with its December Patch Tuesday update to address a massive number of security vulnerabilities for just...
This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files. Cybersecurity researchers at...
Pacu is an open source AWS exploitation framework, designed for offensive security testing against cloud environments. Created and maintained by Rhino Security...
According to Researchers at Radboud University in the Netherlands ‘data storage devices with self-encrypting drives don’t provide the expected level of data...
Experts point out that the recent data breach that had impacted Cathay Pacific exposes a gap in Hong Kong laws. The Hong...
A security researcher has discovered several critical vulnerabilities in one of the most popular embedded real-time operating systems—called FreeRTOS—and its other variants,...
To run flawfinder, simply give flawfinder a list of directories or files. For each directory given, all files that have C/C++ filename...
A Python script for AWS S3 bucket enumeration. Inspired by a conversation with Instacart’s @nickelser on HackerOne, I’ve optimized and published Sandcastle – a...
The lawsuit is due to the flaws in the identification cards issued by the company The Estonian authorities have taken legal action against the security company Gemalto, filing a lawsuit for €152M after security failures in citizen identification cards issued...
Rafay Baloch has reported Vulnerability in Edge and Safari Browsers that Allows Address Bar Exploitation. Nowadays the phishing attacks have become increasingly...
A lawsuit has been filed against tech giant Google, accusing Google of tracking locations even when the “Location History” setting is turned...
This year’s Defcon witnessed many interesting events, including the hacking of voting machines by 11-year-olds and macOS’s vulnerabilities to grant permissions to...
Spreading fake news through WhatsApp was never so easy before. According to the latest research from Check Point security firm, WhatsApp users...
Enterprise network security researchers found dozens of flaws that could expose smart home devices to attacks Enterprise network security experts discovered 20...
Scout2 is a security tool that lets AWS administrators assess their environment’s security posture. Using the AWS API, Scout2 gathers configuration data...
Another day, another security fix released by Intel. In a blog post, Positive Technologies has detailed four different vulnerabilities found in the...
Email users who use PGP (based on OpenPGP) and S/MIME to encrypt and decrypt their communications are at “immediate risk.” The reason...
Modern-day vehicles have become overly digitized for the sake of offering advanced technicality to drivers. However, being digital cannot ensure optimal security...