Featured

Analysis of Windows Active Directory environment using BloodHound

This article examines the analysis of a Windows Active Directory environment using BloodHound . BloodHound ( https://github.com/BloodHoundAD/BloodHound ) is a tool for clarifying unintended relationships...

Big Data And Cyber Security

Companies are constantly looking for new ways to protect sensitive business data from hackers, according to a new report from the Institute for Critical...

Latest news

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

Microsoft has released its own Linux distribution

This week Microsoft posted on GitHub the first stable build of its own Linux distribution,  CBL-Mariner (Common Base Linux), which was...

1 TB of data stolen from oil company Saudi Aramco

Attackers stole 1 TB of confidential data from the Saudi Arabian Oil Company, the national oil company of Saudi...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...

You might also likeRELATED
Recommended to you

More Than 4,000,000 Docker images contain critical vulnerabilities

Researchers from Prevasio  studied 4,000,000 publicly available Docker images hosted on...

More than 226 million accounts leaked, Troy Hunt scans the database

Renowned cybersecurity researcher Troy Hunt analyzed a fresh database...

Configuration error compromises Sophos customer data

The British information security company Sophos has notified its...