Sunday, December 22, 2024

Monthly Archives: February, 2022

A word from our sponsor

spot_img

Destructive HermeticWiper Malware Targets Computers in Ukraine

Just as Russia was preparing to launch an invasion of Ukraine,...

Microsoft, Apple and Google top the list of the most spoofed brands in 2021

IBM’s 2022 X-Force Threat Intelligence Index also revealed that ransomware was...

Hackers are targeting this ‘easy target’. Here’s how to protect yourself

Guidance from the NCSC urges small businesses in construction to boost...

Remote Code Execution in pfSense <= 2.5.2

(RCE) Remote Code Execution in pfSense Summary pfSense allows authenticated users to get...

Snap Privilege Escalation: Vulnerability in Linux Package Manager Snap

A newly discovered Snap flaw allows a low-privileged user to gain...

Q4/21: Sees More DDoS Attacks Than Ever Before

DDoS attacks hit a sad all-time high in the last quarter...

There is a shell in your lunch-box

My team was recently engaged by a client (Hackme) to perform...

“His ultimate goal is to destroy Ukraine” – Ukrainian foreign minister

Ukrainian Minister of Foreign Affairs, Dmytro Kuleba says he knows what...

3 Steps To Better Account Security

Best security practices are the responsibility of all developers, with the...

New Android malware dubbed Xenomorph targets customers of 56 banks

A New Android malware dubbed Xenomorph, served through Google Play Store...