- Advertisement -
ARCHIVE
Yearly Archives: 2021
Popular Game Series “Just Dance” Targeted by Attackers
TheCISO -
Who is Ubisoft?
Ubisoft Entertainment a French video game company.
What Happened?
Ubisoft recently announced that they have identified an intrusion in their IT Infrastructure targeting Just...
Find Information About a Person on Instagram with OSINTgram
OSINT or "Open Source INTeligence" plays a critical role in the field of cybersecurity. It can be used by your company to boost your...
A List of Tools to Help you Detect the Log4j Vulnerability
How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools.
Amazon Inspector and AWS
The Amazon...
NCA Shares 585 Million Compromised Passwords With “Have I Been Pwned”
TheCISO -
The National Crime Agency of United Kingdom (NCA) shared a collection of more than 585 million compromised passwords with the infamous Have I Been...
Threat Actors Impersonating Pfizer
TheCISO -
Phishing campaigns that use COVID-19 as a hook are still on the rise. Hackers are increasingly using vaccine-related emails in their targeted spear-phishing attacks.
Lately,...
Hacking Group Leaked Confidential UK Police Data
TheCISO -
Russian hacking group "Clop" leaked confidential information held by the UK police onto the dark web. The data were stolen from Dacoll, an IT...
Audio Tech Giant Exposed Thousands of Customers’ Data
TheCISO -
Sennheiser, an audio tech giant exposed thousands of customers’ data as discovered by vpnMentor's research team.
Sennheiser had accidentally left an old cloud account full...
Build a Penetration Testing Lab on a Raspberry Pi with DVWA
Build a PenTest Lab on a Raspberry Pi with DVWA
Hunt a Username on Social Media with Sherlock
Many users register themselves on websites using the same username. If you are performing an investigation on a person, and especially if you know...
Latest news
- Advertisement -