1.7 C
Paris
Sunday, January 29, 2023

Hacking

The Colorful Teams of Cybersecurity

You may have heard of terms like "Red", "Blue", even "Purple" when referring to security teams a company employs to test and defend their...

Understand And Reduce Your Attack Surface

The attack surface of your organization can be defined as all the possible entry points an attacker may try to exploit to gain access...

What Is The Difference Between GWAPT and OSWE Penetration Testing Certifications

GWAPT and OSWE are among the top certifications in security and are mainly built for penetration testers. Let's look at the differences between the two...

Rackspace Hosted Exchange Hit By Ransomware

Rackspace's hosted Microsoft Exchange environments were affected by a "security incident" which has knocked out email services to their customers. The Company Rackspace is one of...

APT Group Targeting Governments Worldwide

According to cyber security researchers from Trend Micro, state-financed Chinese hackers have launched a spear phishing campaign to launch bespoke malware stored within Google...

Security Professionals, BEWARE of Fake PoCs

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and...

Best Information Security Books

People refrain from reading either it is for pleasure or for professional and academic progression. If you are an information/cyber security professional who wants to...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Cool tools and accessories for your hacking bag

Besides being ... "cool", it is also extremely useful to have a bag ready with all your hacking tools and accessories ready to go....

Customer data leaked in a newly disclosed Samsung breach

Samsung said that hackers have obtained some customer data in a newly disclosed breach. This breach comes after another intrusion that led to the leak...

Latest