A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite. This security flaw, classified as a Cross-Site Scr… Read More
A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and transformation tool that could result in arbitrary code execution on affected systems.Tracked… Read More
The TriangleDB implant used to target Apple iOS devices packs in at least four different modules to record microphone, extract iCloud Keychain, steal data from SQLite databases used by vario… Read More
Did you know that web application security is a top concern for 68% of organizations? With cyber threats continually evolving, software developers must… Read More
The open-source remote access trojan known as Quasar RAT has been observed leveraging DLL side-loading to fly under the radar and stealthily siphon data from compromised Windows hosts."This… Read More
Posted on Oct 21 Until now, we used SSH tunnels through a bastion EC2 to connect to our database (RDS), facilitating connections from DB client tools (like MySQL Workbench)… Read More
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom."The attacker covertly spied on and harvested sensitive d… Read More
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited.
This means… Read More
Ethereum, the brainchild of Vitalik Buterin, has evolved from a determined second-place player into a formidable contender for the cryptocurrency throne. Currently, there are over 100 milli… Read More
Cisco has released updates to address a critical security flaw impacting Emergency Responder that allows unauthenticated, remote attackers to sign into susceptible systems using hard-coded c… Read More
Posted on Oct 4 Hello world! Today I'll be detailing the steps I took to hack VulnHub's Mr-Robot: 1 VM, created by Leon Johnson. The VM has three keys hidden in different lo… Read More
Cybersecurity is one of the most flourishing domains of late, offering booming job opportunities and strong job security. However, being a high-tech domain, the world of cybersecurity could… Read More