How Chaos Engineering can help predict and prevent cyber-attacks preemptively
It's no surprise that cybersecurity has become a major priority for global businesses of all sizes, often employing a dedicated IT team to focus...
An unpatched vulnerability in NSA’s Ghidra allows a remote attacker to compromise exposed systems
On September 28, the National Security Agency revealed a vulnerability in Ghidra, a free, open-source software reverse-engineering tool. The NSA released the Ghidra toolkit...
TON: Telegram’s decentralized blockchain network face mixed reactions from financial regulators as more information...
Telegram is now joining the blockchain league with Telegram Open Network (TON), Telegram’s blockchain network. TON will integrate blockchain payments to 365 million users...
zfs-0.8.2 releases with support for 2.6.32 – 5.3 Linux kernels and major bug fixes
Last week, the team behind ZFS released zfs-0.8.2, an advanced file system. This release comes with support for 2.6.32 - 5.3 Linux kernels and...
10 times ethical hackers spotted a software vulnerability and averted a crisis
A rise in multiple cyber-attacks and the lack of knowledge and defenses to tackle them has made it extremely important for companies to use...
New iPhone exploit checkm8 is unpatchable and can possibly lead to permanent jailbreak on...
An unnamed iOS researcher that goes by the Twitter handle @axi0mX has released a new iOS exploit, checkm8 that affects all iOS devices running...
Researchers release a study into Bug Bounty Programs and Responsible Disclosure for ethical hacking...
On September 26, a few researchers from the Delft University of Technology (TU Delft) in the Netherlands, released a research paper which highlighted the...
DoorDash data breach leaks personal details of 4.9 million customers, workers, and merchants
Today, DoorDash revealed to its users that their platform suffered a major data breach on May 4, 2019, affecting approximately 4.9 million consumers, dashers,...
How has ethical hacking benefited the software industry
In an online world infested with hackers, we need more ethical hackers. But all around the world, hackers have long been portrayed by the...
A zero-day pre-auth vulnerability is currently being exploited in vBulletin, reports an anonymous researcher
Update: Six days after an anonymous researcher had disclosed a zero-day pre-auth remote code execution vulnerability in vBulletin, Cloudflare has deployed a new rule...