US President Donald Trump always resorts to the term ‘fake news’ to refer to news reports that are not favorable to him,...
The growing variety and sophistication of cybersecurity threats have outpaced the development of conventional security tools. Apart from commoditized and automated hacking...
Network security specialists report that the Nuclear Power Corporation of India (NPCIL), a government-controlled nuclear company, has been the victim of a...
Cybersecurity is a prime concern for all types of businesses nowadays. Unfortunately for small to medium-sized businesses (SMBs), enterprise-grade security often comes...
What is DNS and How Does It Work A Domain Name System, or DNS, takes a familiar and understandable website name like...
00:35 Ministry of Sound, London, UK – We all know what professional development is; I am going to talk about going to...
Why nothing is working in cyber security? Cyber Securities Book of Revelations. I spend a fair amount of time in my current...
Last week, Capital One breach shocked the IT security community after it was revealed that a wannabe hacker was able to steal...
Cyber attacks are on the rise and it isn’t just the large corporations who are targeted, anyone who does anything online is...
Today, Cyber security is one of the fastest growing industry. The increasing numbers of the data breaches and cyber attacks have likewise...
If you have a business and you don’t have an online presence, you’re handicapping yourself. That’s just how it is today. Without harnessing...
In the age of regular cyber attacks and constant digital threats, it’s no wonder that businesses find themselves spending more and more...
Pwn2Own 2019 has yet again proved that a secure system is nothing else but a myth. In its two days running, the...
Recently we informed that the National Security Agency’s (NSA) plans to release GHIDRA, the famous reverse engineering tool in March. As per...
Download Kali Linux 2019.1 now! – This is the first major update for Kali Linux ever since version 4.0 was released in 2011. Kali...
Hungary’s Prosecution Service has accused an ethical hacker and computer specialist of infiltrating the Magyar Telekom database. The office found him involved...
Tesla is partnering with Pwn2Own’s bug bounty to identify vulnerabilities in its Model 3 car software. Electric car maker Tesla announced recently...
SpiderFoot is an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given...
This is the third in a series of blog posts “on all things Bot” – The first two posts are available here...
This is the first in a series of blog posts “on all things Bot.” From bad to good and looking towards the...
Several Critical Vulnerabilities Identified in Major Weapon Systems Being Developed by US DoD. The advanced weapon systems developed by the US Department...