Kali Linux 2024.4 released with new tools, improved Raspberry Pi support

Kali Linux 2024.4 has just been released with 14 new tools, improved…

Why the FBI says you need to use encrypted messaging now

Salt Typhoon, hackers linked to the Chinese government, have breached dozens of telecom providers. Now the FBI is urging Americans to use encrypted apps like Signal, WhatsApp, or Facebook Messenger.

Red Team vs. Blue Team vs. Purple Team in Cybersecurity

Are you wondering what a Red vs. Blue team is in cybersecurity? Learn what these teams do, how it’s different from a penetration test, and what jobs you can pursue.

North Korea is funding its nuclear program with cyber espionage and LinkedIn hiring scams

Hackers from North Korea have stolen over $600 million from cryptocurrency exchanges, and deployed ransomware to steal nuclear and energy research from defense and military agencies

Using Generative AI LLM agents to exploit zero-day vulnerabilities

Can Generative AI be used for exploiting zero-day vulnerabilities on websites? A team of research scientists investigates the capability of Large Language Model (LLM) agents to find out.

What is fuzzing in cybersecurity?

Cybersecurity fuzzing or fuzz testing identifies software vulnerabilities by injecting malformed data. It’s crucial for uncovering unknown weaknesses and simulating real-world attacks.

Mandiant M-Trends 2024: Inside the annual cybersecurity report

The latest Mandiant M-Trends 2024 report has dropped and we breakdown some of the key findings

LockBit Ransomware Group Shutdown by FBI, NCA

The notorious LockBit ransomware group, responsible for over 17,000 cyberattacks against U.S.…