Apple bug bounty program

Apple to Pay Up to $1 Million For Hackers Who Can Gain Complete Control...

Apple expands its bug bounty program to cover all operating systems that include macOS, watchOS, tvOS, iPadOS, and iCloud along with the...
Azure Security Lab

Microsoft Launches Azure Security Lab, Bounty Reward for Researchers up to $40,000

Microsoft launched Azure Security Lab, a set of dedicated cloud hosts for researchers to confidently and aggressively test Azure vulnerabilities.
Burp Suite 2.1.02

Burp Suite Version 2.1.02 Released – Added Support for WebSockets in Burp Repeater

Burp is one of the most famous tools used by pentesters, which incorporates a full static code investigation engine to discover vulnerabilities....
Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes

Critical Account Take over Vulnerability Allows to Hack Your Instagram Account within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of your Instagram...
penetration testing

How to Prepare for a Career in Ethical Hacking and Penetration Testing

Ethical hacking or penetration testing courses describes the process of finding and disclosing security flaws in system architectures and being paid big...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security