11.9 C
Munich
Sunday, April 28, 2024
- Advertisement -

ARCHIVE

Monthly Archives: March, 2022

Three Approaches to Penetration Testing

Penetration testing is a form of ethical security assessment which aims to help organizations identify, safely exploit, remove vulnerabilities and overall improve security across...

Apple Releases Patches Fixing 39 Vulnerabilities

In recent security updates released on March 14, Apple releases patches fixing 39 vulnerabilities several of which could allow an attacker to execute arbitrary...

ThePhish: An Open Source Phishing Email Analysis Tool

A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi,...

Cyberattack Crashes Israeli Government Websites

Users unable to reach sites with gov.il extension for an hour, as National Cyber Directorate reportedly declares state of emergency over incident. Communications Minister Yoaz...

Email Which Claims to Come from Saudi Aramco Delivers Malware

MalwareBytes research team found a targeted email campaign carrying two attachments, a pdf file and an excel file. The email pretends to come from Saudi...

Retailer Blames Third-Party for the Data Breach of More than 100,000 Payment Cards

Beauty product retailer Acro revealed that customers of two of its websites were impacted, exposing more than 100,000 payment cards. The attack compromised the...

How to Secure Your Microservices

Compared to monolithic applications, which house all code in a single system, microservices are small, autonomous units that address individual functions and work with...

Awesome Free Hacking Tool for Red Teams and Pentesters

Lets check out this awesome free hacking tool which can be extremely useful for red teams and pentesters during their penetration testing or red...

Latest news

- Advertisement -