Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

Intel Headquarters

Intel’s DDIO and RDMA enabled microprocessors vulnerable to new NetCAT attack

0
Two days ago, Intel disclosed a vulnerability in their 2011 released line of micro processors with  Data Direct I/O Technology (DDIO) and Remote Direct...
simjacker

A new Stuxnet-level vulnerability named Simjacker used to secretly spy over mobile phones in...

0
Updated: On September 27, a few researchers from the Security Research Labs (SRLabs) released five key research findings based on the extent of Simjacker...
simjacker

UK’s NCSC report reveals significant ransomware, phishing, and supply chain threats to businesses

0
Last week, the UK’s National Cyber Security Centre (NCSC) published a report on cyber incident trends in the UK from October 2018 to April...
Ecuador data breach

An unsecured Elasticsearch database exposes personal information of 20 million Ecuadoreans including 6.77M children...

0
Data leaks have become commonplace. Every week we hear of at least one data breach that has existed maybe over months or years without...
CWE Top 25 list

MITRE’s 2019 CWE Top 25 most dangerous software errors list released

0
Two days ago, the Cybersecurity and Infrastructure Security Agency (CISA) announced MITRE’s 2019 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors list....

Click2Gov software vulnerable for the second time; breach hits 8 US cities

0
A vulnerable municipality software, Click2Gov, is known to be part of a breach involving eight cities last month, Threatpost reports. The Click2Gov software is...
ESA data leak security

A zero-day pre-auth vulnerability is currently being exploited in vBulletin, reports an anonymous researcher

0
Update: Six days after an anonymous researcher had disclosed a zero-day pre-auth remote code execution vulnerability in vBulletin, Cloudflare has deployed a new rule...
dark web spy spy

How has ethical hacking benefited the software industry

0
In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the...

DoorDash data breach leaks personal details of 4.9 million customers, workers, and merchants

0
Today, DoorDash revealed to its users that their platform suffered a major data breach on May 4, 2019, affecting approximately 4.9 million consumers, dashers,...
The best penetration testing tools for ethical hackers

Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking...

0
On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews