Alphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…
Read MoreAlphabet’s Chronicle, the cybersecurity owes its inception to X (formerly Google X), launched its first product — a security data platform called Backstory. Backstory gives security analysts the ability to…
Read MoreTo identify vulnerabilities that can compromise your security, performance, or functionality, you need to have a vulnerability assessment in place. It is a method used by a qualified provider of…
Read MoreCybercriminals always look for vulnerabilities in routers, and if they find one, it becomes an easy target for them. We have seen how the hackers were not only scratching the…
Read Moreprocedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…
Read MoreWe usually get to hear of vulnerabilities that cybercriminals exploit to expose or steal data. This time it’s the other way around; the criminals are at the receiving end. A…
Read MoreA fatal cross-site request forgery (CSRF) vulnerability on Facebook was discovered by a security researcher, and interestingly it allowed hackers to take over Facebook accounts with a simple one-click on…
Read MoreWe often hear it. A Bank X was hacked. Social Media Site Z became a victim of a data breach. Celebrity Y was hacked, and we knew who she had…
Read MoreAn article on ZedNet reads how a security researcher published proof-of-concept (PoC) code for a vulnerability impacting Ubuntu and other Linux distros. Canonical, the parent company of Ubuntu operating system,…
Read MoreA major security flaw under CVE-2019-05736 that has affected runC is now patched, thanks to the hard work of its developers. The vulnerability enabled a guest container’s root privileges to…
Read More