Friday, May 17, 2024

Yearly Archives: 2020

A word from our sponsor

spot_img

Intel and AMD processors affected by another side-channel exploit

Two years after Spectre and Meltdown, the x86 processor faces another...

Crystal Blockchain: Security Breaches And Fraud Involving Crypto Still High Despite Tech Development

It’s ten years since the first official cyber-terrorist attack of a...

Deception tools and how they ensnare attackers

Featuring TrapX, Fidelis Deception, Attivo and Aclvio Shaddowplex Deception tools have come...

What is identity theft? and 5+ Ways to prevent it

Identity theft has taken on a whole new life in the...

$2 million stolen in Akropolis DeFi exploit

On Thursday, November 12th, the DeFi platform Akropolis–which allows users to...

The 4 Types of Threat Intelligence Vendors

Key Takeaways Not all threat intelligence services and providers are created equal.We...

Open Source Intelligence What is it? and How Is it Used? (OSINT)

OSINT Key Takeaways Open source intelligence is derived from data and information that...

Ubuntu novice cheat sheet

Cheat sheet for Ubuntu Begginers We'll try to prevent copy pasting with...

Cheat Sheet for Analyzing Malicious Software

This cheat sheet presents tips for analyzing and reverse-engineering malware. It...

October CMS Build 465 – Arbitrary File Read Exploit (Authenticated) 11-13

Date added: 2020-11-13 Just one of many vulns discovered on this cms. #...