11.9 C
Munich
Sunday, April 28, 2024
- Advertisement -

ARCHIVE

Yearly Archives: 2021

Popular Game Series “Just Dance” Targeted by Attackers

Who is Ubisoft? Ubisoft Entertainment a French video game company. What Happened? Ubisoft recently announced that they have identified an intrusion in their IT Infrastructure targeting Just...

Find Information About a Person on Instagram with OSINTgram

OSINT or "Open Source INTeligence" plays a critical role in the field of cybersecurity. It can be used by your company to boost your...

A List of Tools to Help you Detect the Log4j Vulnerability

How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools. Amazon Inspector and AWS The Amazon...

NCA Shares 585 Million Compromised Passwords With “Have I Been Pwned”

The National Crime Agency of United Kingdom (NCA) shared a collection of more than 585 million compromised passwords with the infamous Have I Been...

Threat Actors Impersonating Pfizer

Phishing campaigns that use COVID-19 as a hook are still on the rise. Hackers are increasingly using vaccine-related emails in their targeted spear-phishing attacks. Lately,...

Hacking Group Leaked Confidential UK Police Data

Russian hacking group "Clop" leaked confidential information held by the UK police onto the dark web. The data were stolen from Dacoll, an IT...

Why Do Data Breaches Happen

Why Do Data Breaches Happen

Audio Tech Giant Exposed Thousands of Customers’ Data

Sennheiser, an audio tech giant exposed thousands of customers’ data as discovered by vpnMentor's research team. Sennheiser had accidentally left an old cloud account full...

Build a Penetration Testing Lab on a Raspberry Pi with DVWA

Build a PenTest Lab on a Raspberry Pi with DVWA

Hunt a Username on Social Media with Sherlock

Many users register themselves on websites using the same username. If you are performing an investigation on a person, and especially if you know...

Latest news

- Advertisement -