Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
LinkedIn iOS App

LinkedIn iOS App Caught Reading Clipboard With Every Keystroke, Says it is a Bug

LinkedIn caught snooping on the clipboard data of every keystroke, the issue was discovered with the beta version of iOS 14.
Open source

Beware of Dangerous Security Risks By Using Open-Source Software and Tools

Open-source is increasingly prevalent, either as components in software or as entire tools and toolchains. It has become...
Data Theft

When Data Theft Is an Inside Job

From the University of Nebraska in the U.S. to a leading Canadian credit union, and a dustup between Tesla Motors and China’s...
Most Important Consideration To Prevent Insider Cyber Security Threats In Your Organization

Most Important Consideration To Prevent Insider Cyber Security Threats In Your Organization

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend most of...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security