Cybersecurity agencies in India are slightly relaxing their controversial and complex requirements for reporting on information security incidents, although they reaffirm that...
The iPhone of New York Times journalist Ben Hubbard was repeatedly hacked with NSO Group’s Pegasus spyware tool over a three-year period...
Following a series of security mishaps and data abuse through its social media platform, Facebook today expanding its bug bounty program in...
Zero-Day Android exploits are now more valuable then iOS exploits. The infosec and premium zero-day acquisition platform Zerodium known for selling zero-day...
Data protection specialists say that, after two years, business advisory firm Equifax has reached an agreement with U.S. government agencies to pay...
The flaw allowed anyone with knowledge of brute force attack to hack Instagram accounts without raising any suspicion. How to hack Instagram...
Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the...
Hungary’s Prosecution Service has accused an ethical hacker and computer specialist of infiltrating the Magyar Telekom database. The office found him involved...
The social network would pay up to $40k USD for reporting errors that allow a single account takeover In the middle...
A Web Dashbord for Nmap XML Report Usage You should use this with docker, just by sending this command: $ mkdir /tmp/webmap...
The bug bounty program will remain open until December 31st, 2018. Recently, the identification of serious CPU flaws called Spectre and Meltdown shook...
According to an information security firm, China is attempting to cover up inexplicable delays in public reporting of high-risk software security holes...
Cyber vulnerability hoarding? The US government publishes its Vulnerabilities Equities Policy (VEP) and describes the process by which cyber flaws found by...
There are so many protocols out there in the computer networks world which focus on the QoS and improving data transmission quality...
Pizza Hut hacked and some of its clients who utilized the fast food chain’s website and application were influenced by the data...
Dradis is an open-source collaboration framework, tailored to InfoSec teams. Goals Share the information effectively. Easy to use, easy to be adopted....
Usually, a bug bounty program helps companies secure their software and products from zero day vulnerabilities that can cause massive damage if cyber...
Another day, another data breach but this one will haunt the targeted customers for a long time. Equifax, a consumer credit reporting...
Despite being an expanding threat, ransomware infections are rarely reported to law enforcement agencies, according to conclusions from the 2016 Internet Crime...
The search engine and tech giant Google has now increased the reward for finding bugs in Android OS to $200,000. Stepping up...
It can perform a lockdown. Unlike some other scripts it has the capability to backout changes. Files are backed up using cpio...