CVE-2023-36052 is a critical security vulnerability in the Azure Command-Line Interface (CLI), a tool for managing Azure resources. This vulnerability, reported by...
Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has...
Data security specialists at security firm Safety Dectectives & CNET have discovered a massive data breach (almost 900 GB of compromised information)...
Have you ever asked yourself the question: “So what if my VPN keeps logs?” Don’t worry. It’s a good question to ask....
A California-based Voice-Over-IP (VoIP) services provider VOIPO has accidentally left tens of gigabytes of its customer data, containing millions of call logs,...
After cracking down on apps involving ad-fraud and spread of malware, Google is calling rogue Android apps on Play Store which require...
A few hours ago, the company announced its “not shocking” intention to shut down Google+ social network as a result of a...
Discover sub-domains by searching through Certificate Transparency logs. What is CT? Certificate Transparency (CT) is an experimental IETF standard. The goal of...
A security researcher from ESET has announced that he has unearthed new Android-based spyware that is capable of accessing the Whatsapp database...
Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your...
It is said that a picture is worth a thousand words, so pairing up your articles, blogs, newsletter, ad-campaigns or presentations with...
VPN Logs Lead to Capturing of an Ex-PenAir Employee Who Hacked Into Company’s Internal Networks. A 59-year old US female has been...
Facebook is in hot waters for the last couple of weeks after it was reported that the company secretly shared 50 million...
If the Cambridge Analytica story wasn’t enough, Facebook is again under fire for collecting people’s call logs and SMS history for years....
Catching phishing by observing certificate transparency logs. This tool is based on regex with effective standards for detecting phishing sites in real...
Some quick tips if you use S3 buckets: Randomise your bucket names! There is no need to use company-backup.s3.amazonaws.com. Set appropriate permissions...
Today, 9 November 2017, WikiLeaks publishes the source code and development logs to Hive, a major component of the CIA infrastructure to...
On Friday a New Town, Massachusetts based man called Ryan Lin was arrested for cyberstalking after his VPN logs were provided by...
New Banking Malware called “Svpeng” -Trojan-Banker.AndroidOS.Svpeng.ae Discovered with New Advance Futures that working as Keylogger and steals sensitive information such as Entering texts,...
SQL CHAR encoding SQL CAST encoding Case encoding of SQL keywords Substring(Experimental – Disabled by default as it will fail with nested...
Communications failure leads to zero day, late patch, natch. Millions of do-it-yourself websites built with the Wix web maker were at risk...