
Hundreds of Vulnerabilities in Common Wi-Fi Routers Affect Millions
Researchers from the German IT Magazine publisher CHIP discovered hundreds of potential vulnerabilities across nine [...]
Google Project Zero Detect Vulnerabilities in Zoom
Security experts from Google Project Zero detected two vulnerabilities in the video conferencing application Zoom [...]
“Cryptic Clouds” Hacker’s Compromise Google Cloud Accounts to Mine Cryptocurrency
Threat actors are actively exploiting a misconfigured Google Cloud Platform (GCP) infrastructure to mine cryptocurrency. [...]
Microsoft Exchange Servers Compromised in Reply-Chain Attacks
Threat actors are leverage known vulnerabilities against unpatched exchange servers to distribute malware and avoid [...]
Red Team vs. Penetration Test: Clearing Up the Confusion
More than often, when organisations are directed by the board to deploy a Red Team [...]
Avanan Observed a New Amazon Cyber Attack
Christmas is here, which only means that it is officially shopping season and considering the [...]
Boost ROI with Red Team Testing
Typically, ROI is seen as money spent vs money received to see if the investment [...]
Microsoft WPBT Vulnerability Allow Hackers to Install Rootkits on Windows Devices
Security researchers from the Eclypsium research team have discovered a vulnerability in the Windows Platform [...]
Unlocking the Potential: Exploring the Benefits of a vCISO
There is no doubt that the number of qualified and available cyber security experts is [...]