Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 …
New Programming Language “Kotlin” used for Developing an Android Malware
An Open-source Programming language “kotlin” has bee used to develop malicious Android apps that are capable of hijacking an Android …
Florida hack exposes 30K Medicaid patients’ files
Florida officials announced late Friday that hackers may have accessed the personal information and medical records of up to 30,000 …
Ransomware Attack Response and Mitigation Checklist
Ransomware is one of the fast Growing threat in the worldwide and its considered as a leader of Global cyber …
Using Breach & Attack Simulation Technologies to test Organizations Security Posture on-demand
The best way for an organization to protect itself against cybercrooks is to think and act like one. There is …
New Malware Campaign Trick Victims as an Adobe Flash Player Installers
Security researchers from ESET identified the sophisticated hacker group Turla added new malware to its arsenal. It attempts victims to …
WPA3 Announced After KRACK Attack to Improve Security for Personal and Enterprise Wi-Fi Networks
Wi-Fi alliance introduced WPA3 security standard with new enhancements to reduce the potential attacks against network misconfiguration and centralized authentication …
Meltdown and Spectre: Breakdown of The recent CPU Security Bug
Much like how Icarus flew too close to the sun.In trying to catch up with Moors law the CPU’s manufacturers …
SIEM Better Visibility for Analyst to Handle an Incident with Event ID
We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends in siem …
Advantages of Bug Bounty Program Over Traditional Penetration Testing
Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web …