Tuesday, May 21, 2024

Yearly Archives: 2023

A word from our sponsor

spot_img

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its...

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence...

Evolution of The World Wide Web (WWW)

The World Wide Web (WWW) has arguanble gone through mind-blowing ammounts...

pfBlockerNG 2.1.4_26 – (RCE) Remote Code Execution

# Exploit Title: pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE) # Shodan...

Google Open-Source Vulnerability Scanning Tool

The Open Source Vulnerability (OSV) database's front-end interface, OSV-Scanner, was made...

The Shadow Warriors: The Rise of Russian State Hackers

Hacking is a shadowy world, with shadowy characters working behind the...

“What Came First, Cyber or Security?”: The Timeless Debate That Shapes Our Digital World

The digital world is constantly evolving, and with each new advancement...

JD Sports: Cyber Attack affects 10 million customers

Following a cyber-attack, sportswear retailer JD Sports warned that stored information...

InfoSec – A Newbie Guide – InfoSecurity

Information security, also known as cybersecurity, is the practice of protecting...

Polymorphic Malware Produced by ChatGPT

OpenAI's ChatGPT has reportedly created a new strand of polymorphic malware...