“Women in Cybersecurity”- a really interesting and relevant topic to discuss- not only on Women’s Day but perhaps on any other day. Let’s begin the discussion on a rather positive…
Read More“Women in Cybersecurity”- a really interesting and relevant topic to discuss- not only on Women’s Day but perhaps on any other day. Let’s begin the discussion on a rather positive…
Read MoreIn a surprise move at the RSA security convention, the National Security Agency announced the release of Ghidra, a free open source free software engineering toolkit. NSA has been using…
Read MoreAlphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…
Read MoreAccording to an article on helpnetsecurity.com, it reads that nearly 40 percent of good domains carried malicious URLs. So now the question arises is legitimate websites compromised to host malicious…
Read MoreWhat will you think of when you hear the word “information leak due to unauthorized access“? Why data breach incidents does not decrease? One of the reasons is the sophistication…
Read MoreJust like other social media platforms before it like Twitter and Facebook, Instagram (which is also a Facebook property) has experienced massive growth of its user base for the last…
Read MoreVarious anti-malware vendors are scrambling to fix their products in order to detect the new variant of Separ malware family. Separ is known as a password stealer virus, with its…
Read MoreA fatal cross-site request forgery (CSRF) vulnerability on Facebook was discovered by a security researcher, and interestingly it allowed hackers to take over Facebook accounts with a simple one-click on…
Read MoreThe 35-day long U.S. Government shutdown has not only delayed basic government services and underfunded the operations of many state agencies and companies, but also caused a lot of missed…
Read MoreCybercriminals love to target institutions that either holds a lot of personal information or lots of money with weak security. Of course, the mainstream banks have a lot of money…
Read More