COVID-bit: Exfiltrating data from air-gapped computers

A new research paper by Dr. Mordechai Guri, head of R&D in…

Researchers find vulnerability to bypass web application firewalls

Researchers from Claroty, a cybersecurity company specializing in securing the internet of…

How to learn Ethical Hacking

Ethical hacking, also known as white hat hacking, involves using the same…

What is a Virtual Private Network?

A virtual private network (VPN) is a technology that allows users to…

What is Zero Trust Cybersecurity?

Zero trust cybersecurity is a security approach that assumes that all users…

Google releases YARA rules for Cobalt Strike to deter abuse

Cobalt Strike is one of the most popular red team tools to…

How to get started on Infosec Mastodon

In case you haven’t heard, Elon Musk purchased Twitter for $44 billion…

S3crets Scanner scans AWS S3 buckets for secrets

A new open source tool ‘S3crets Scanner’ scans Amazon Web Services (AWS)…