9.1 C
Munich
Sunday, May 5, 2024
- Advertisement -

TAG

Vulnerability

Why Do Data Breaches Happen

Why Do Data Breaches Happen

Build a Penetration Testing Lab on a Raspberry Pi with DVWA

Build a PenTest Lab on a Raspberry Pi with DVWA

Massive Internet Scans and Log4j Exploit Attempts

It is clear that the Log4j vulnerability is one of the most serious vulnerabilities in recent years. Many organizations have noticed a surge in...

How to Secure Your Zoom Meetings

Increasingly more people are remote working and many are using the videoconferencing platforms for meetings and training. There is a range of virtual conference...

Apple sues company known for hacking iPhones

Apple sues company known for hacking iPhones on behalf of governments. An Israeli firm called NSO Group, provided software to government agencies and law...

What is a “Zero-Day” Exploit

What is a Zero-Day Exploit, what is the timeline of a zero-day attack, examples of zero-day attacks and ways to defend your organization.

Free and Essential Security Tools You Should Already Be Using

Whether you are on the offensive or the defensive side of cybersecurity, there are open-source tools that are free to use and are essential...

“Thunderspy” Attack Impacts Millions of Apple, Windows, Linux Machines

Björn Ruytenberg, a researcher at Eindhoven University of Technology, discovered a security flaw in Intel's Thunderbolt ports, common to many laptops produced before 2019. "If your computer...

iPhones Crashing From Simple Text Messages

The latest Apple mobile OS version iOS 13.4.1 has a text bomb bug that forces the device (Mac, Apple Watch, iPhone, or iPad) to...

Docker Security Practices

Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...

Latest news

- Advertisement -