- Advertisement -
TAG
Vulnerability
Build a Penetration Testing Lab on a Raspberry Pi with DVWA
Build a PenTest Lab on a Raspberry Pi with DVWA
Massive Internet Scans and Log4j Exploit Attempts
TheCISO -
It is clear that the Log4j vulnerability is one of the most serious vulnerabilities in recent years. Many organizations have noticed a surge in...
How to Secure Your Zoom Meetings
Increasingly more people are remote working and many are using the videoconferencing platforms for meetings and training. There is a range of virtual conference...
Apple sues company known for hacking iPhones
Apple sues company known for hacking iPhones on behalf of governments. An Israeli firm called NSO Group, provided software to government agencies and law...
What is a “Zero-Day” Exploit
What is a Zero-Day Exploit, what is the timeline of a zero-day attack, examples of zero-day attacks and ways to defend your organization.
Free and Essential Security Tools You Should Already Be Using
Whether you are on the offensive or the defensive side of cybersecurity, there are open-source tools that are free to use and are essential...
“Thunderspy” Attack Impacts Millions of Apple, Windows, Linux Machines
TheCISO -
Björn Ruytenberg, a researcher at Eindhoven University of Technology, discovered a security flaw in Intel's Thunderbolt ports, common to many laptops produced before 2019.
"If your computer...
iPhones Crashing From Simple Text Messages
TheCISO -
The latest Apple mobile OS version iOS 13.4.1 has a text bomb bug that forces the device (Mac, Apple Watch, iPhone, or iPad) to...
Docker Security Practices
Docker may be a new thing for many environments but it has been around long enough to be considered ready for production use. Like...
Latest news
- Advertisement -