Articles

Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users

A US tech company that manages popular family tree software has exposed tens of thousands of its users’ personal information online via a misconfigured...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Emotet Botnet is Back!

Emotet, one of today's most prominent malware botnets, has come back to life after a period of inactivity of almost four months starting at...

Pentest Tools Framework

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools...

Router Exploitation Framework – RouterSploit

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aids penetration testing operations: exploits - modules that...

Analysis of Windows Active Directory environment using BloodHound

This article examines the analysis of a Windows Active Directory environment using BloodHound . BloodHound ( https://github.com/BloodHoundAD/BloodHound ) is a tool for clarifying unintended relationships...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect sensitive business data from hackers, according to a new report from the Institute for Critical...

Latest news

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

1 TB of data stolen from oil company Saudi Aramco

Attackers stole 1 TB of confidential data from the Saudi Arabian Oil Company, the national oil company of Saudi...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT...

93,000 people paid for fake mining apps

Lookout found that around 93,000 users were paying for 172 Android...

Sophos and ReversingLabs Introduce a Database with 20 Million Data for Information Security Researchers

Information security companies Sophos and ReversingLabs announced the release of the SoReL-20M database , which consists...