Cyber Security

Automation Of Penetration Testing With Machine Learning

Penetration Testing in Simple Words, is to identify and indicate a vulnerability and perform set of actions to test if the Target is Exploitable...

Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users

A US tech company that manages popular family tree software has exposed tens of thousands of its users’ personal information online via a misconfigured...

Emotet Botnet is Back!

Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...

Latest news

Microsoft Edge browser will warn users about “leaked” passwords

The browser will constantly check the information against databases of information about declassified logins and passwords. Continuous monitoring of passwords...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in TCP / IP stacks, collectively named NAME: WRECK . These problems affect hundreds...

Pwn2Own ended 2021. Windows 10, Ubuntu, Safari, Chrome, Zoom and more were successfully jailbroken

The largest hacking competition - the spring Pwn2Own 2021 - has ended. This time it all ended in a...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

You might also likeRELATED
Recommended to you

Lenoardo S.p.A Data Breach; 94 Attacked Devices with Malware

ThreatIT Team Reports: Through a newly engineered Trojan, inoculated...

NAME: WRECK vulnerabilities threaten millions of IoT devices

Forescout experts presented a report on nine vulnerabilities in...