This year’s Defcon witnessed many interesting events, including the hacking of voting machines by 11-year-olds and macOS’s vulnerabilities to grant permissions to...
Spreading fake news through WhatsApp was never so easy before. According to the latest research from Check Point security firm, WhatsApp users...
Enterprise network security researchers found dozens of flaws that could expose smart home devices to attacks Enterprise network security experts discovered 20...
Scout2 is a security tool that lets AWS administrators assess their environment’s security posture. Using the AWS API, Scout2 gathers configuration data...
Another day, another security fix released by Intel. In a blog post, Positive Technologies has detailed four different vulnerabilities found in the...
Email users who use PGP (based on OpenPGP) and S/MIME to encrypt and decrypt their communications are at “immediate risk.” The reason...
Modern-day vehicles have become overly digitized for the sake of offering advanced technicality to drivers. However, being digital cannot ensure optimal security...
Critical Flaws in Intel’s Remote Keyboard App for Android Lead to its Discontinuation. As is the norm with security researchers, when bugs...
Last week, the Isreal-based security company CTS labs was trending in the news for disclosing 13 critical vulnerabilities in AMD’s Ryzen and...
The bug bounty program will remain open until December 31st, 2018. Recently, the identification of serious CPU flaws called Spectre and Meltdown shook...
Researchers at the Purdue University and the University of Iowa, USA, have managed to break the key 4G LTE protocols for generation...
A flight of new research papers show 4G LTE networks can be exploited for all sorts of badness. There have been lots...
Another AWS Bucket exposed to the public. This time the AWS Bucket belonged to Birst. A cyber security team have discovered a...
Hackers could be close to developing malware that exploits flaws, suggests a German cybersecurity firm. AV-Test, an independent German antivirus testing and...
Hackers can exploit security flaws in ManageEngine software to gain administrator type control of the system. Digital Defense Inc., a San Antonio based IT security...
Security researchers have identified a new in-kind Zyklon malware campaign that spreads advanced botnet malware using at least three newly disclosed vulnerabilities...
CS Suite is a one stop tool for auditing the security posture of the AWS infrastructure and does system audits as well....
Apple has issued a statement regarding the Meltdown and Spectre vulnerabilities, confirming all Mac systems and iOS devices are affected, but saying...
The prosecutions were filed in California, Oregon, and Indiana, according to The News. The three incidents focus on the setback in Intel...
Meltdown and Spectre vulnerabilities haunting users and Tech Giants worldwide – Now the Giants have addressed the issue. Recently, we reported about...
After initial reports of Intel screwing up big time in the form of massive security flaws, it was later released that the...