News Technology COVID-bit: Exfiltrating data from air-gapped computers A new research paper by Dr. Mordechai Guri, head of R&D in… Rob WatersDecember 11, 2022No comments2 minute read
News Technology Researchers find vulnerability to bypass web application firewalls Researchers from Claroty, a cybersecurity company specializing in securing the internet of… Rob WatersDecember 11, 2022No comments2 minute read
News Over 5.4 million Twitter users’ data stolen, leaked online According to reports, over 5.4 million Twitter users’ data was stolen through… Rob WatersNovember 28, 2022No comments2 minute read
Featured News The mental health impact of ransomware attacks Ransomware attacks are on the rise with no slowdown in sight. With… Rob WatersJuly 14, 2023No comments2 minute read
News Technology Google releases YARA rules for Cobalt Strike to deter abuse Cobalt Strike is one of the most popular red team tools to… Rob WatersNovember 22, 2022No comments2 minute read
News Google rewards hacker with $70K for Pixel Phone lock screen bypass bug Google has paid David Schütz, a hacker and security researcher, $70,000 for… Rob WatersNovember 11, 2022No comments3 minute read
News APT29 using Windows Credential Roaming bug to target diplomats A new report from Mandiant, the cybersecurity firm recently acquired by Google,… Rob WatersNovember 10, 2022No comments1 minute read
News Technology S3crets Scanner scans AWS S3 buckets for secrets A new open source tool ‘S3crets Scanner’ scans Amazon Web Services (AWS)… Rob WatersOctober 31, 2022No comments1 minute read
News Gen Z, Millennial workers are biggest workplace cybersecurity risks New research conducted by Ernst & Young finds that a majority of… Rob WatersOctober 19, 2022No comments2 minute read
News Microsoft Office 365 email encryption vulnerability could expose message content Researchers from cloud and endpoint protection firm WithSecure has discovered an unpatchable… Rob WatersOctober 16, 2022No comments2 minute read