After a fairly long development process and quite a few updates, the release is ready; Parrot 4.0 is now available for download....
According to research conducted by information security professionals at Trustwave, Western Digital’s My Cloud EX2 storage devices filter files to anyone in...
It’s not hidden that apart from costing tons of money, the use of proprietary software also brings along hidden security caveats. These...
Cloudflare introduces Spectrum to protect any services that connected to the Internet. Spectrum works in the same way as the Cloudflare and it...
Information security training experts from MindPoint Group, an information security firm, have hijacked over 2,000 subdomains from legitimate websites while researching possible...
iCloudBrutter is a simple python (3.x) script to perform basic bruteforce attack againts AppleID. Usage of iCloudBrutter for attacking targets without prior...
The widely distributed Gozi ISFB banking Trojan has a new trick up its sleeve; it has been making use of the evasive...
HatCloud is built in Ruby. It tries to bypass CloudFlare and discover real IP. This can be useful if you need to...
While Elon Musk might be busy making plans to take humans to Mars and impress people with SpaceX’s upcoming internet satellite launch,...
Crooks find poorly secured access credentials, use them to install stealth miner. Add Tesla to the legion of organizations that have been...
It is 2018 and the easiest way to make quick money at someones else’s expense is mining cryptocurrency. This time, however, researchers...
Every day we hear news of more malware endangering the information security of users. Therefore, the main companies, such as Dropbox, Google...
Cloudflare is a service that acts as a middleman between a website and its end users, protecting it from various attacks. Unfortunately,...
KnowBe4’s Chief Hacking Officer Kevin Mitnick called me with some chilling news. A white hat hacker friend of his developed a working “ransomcloud” strain, which...
Almost three years after the massive leakage of high-profile celebrities’ nude photos—well known as “The Fappening” or “Celebgate” scandal—a fourth hacker has...
CS Suite is a one stop tool for auditing the security posture of the AWS infrastructure and does system audits as well....
Backups of virtual machines on some hosts could be accessed or altered by an attacker. While everyone was screaming about Meltdown and Spectre,...
In yet another revelation of severe loopholes, a security researcher James Bercegay from Gulftech has discovered a backdoor in some models of...
It’s time to learn how to renew its OS because researcher James Bercegay has found a dozen models possess a hard-coded backdoor....
Meltdown and Spectre vulnerabilities haunting users and Tech Giants worldwide – Now the Giants have addressed the issue. Recently, we reported about...
AWS SSO will let users manage access to multiple AWS accounts and applications using their existing corporate credentials. Amazon Web Services’ re:Invent...