What Is A Bug Bounty Program? A Bug bounty program is also known as vulnerability rewards program (VRP) is the

Facebook announced that they suspended “tens of thousands” of apps associated with 400 developers due to the privacy concern, and

Wireshark 3.0.5 has been released with the new Qt version and fix for other vulnerabilities. The Qt is the library

Nearly 80% of global organizations now rank cyber-risk as a top-five business concern, but just 11% are highly confident they

The US Air Force is requesting quotes from vendors that can provide support for a cybersecurity project under a contract

Cofense researchers spotted a phishing campaign that is targeting taxpayers in the United States to infect them with the Amadey

D-link DNS-320 Devices have used as an ideal backup solution, it offers an effective way to share documents, music, videos,

Trend Micro researchers reported that a Magecart group has hacked the websites of two hotel chains to inject scripts targeting

Harbor is a cloud-native registry that offers rich functions in container management that stores signs and scan images for vulnerabilities.

Threats actors behind the Smominru botnet compromised nearly 90,000 windows computers in last month using EternalBlue exploit and performing brute

A lack of security on WeWork’s WiFi network has left sensitive user data exposed. In August, Fast Company revealed that

The City of Los Angeles and IBM are joining forces with the LA Cyber Lab to help local businesses combat

Eight years ago, a list of the world’s most dangerous software errors was published by problem-solving nonprofit the MITRE Corporation.

People using mobile apps to book hotel rooms for their vacations have been targeted by a skimming attack. Research by

Purchasing cyber insurance to protect your business from the ever-increasing number of threats will cost you more in Delaware than

Facebook has taken down hundreds of Facebook and Instagram Pages and accounts after two separate coordinated campaigns were discovered attempting

Together, phishing and social engineering are by far the number one root-cause attack vector, and they have been around nearly

Researchers at Guardicore Labs reported that the Smominru botnet is rapidly spreading and now is already infecting over 90,000 machines


IT Security

Web server pen testing performing under 3 major category which is identity, Analyse, Report Vulnerabilities such as authentication weakness, configuration

Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses

In 2008, Bernie Madoff admitted to masterminding an $80 billion Ponzi scheme — a scheme that should have made many


In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any

What is an Indicator of Attack (IOA) IoA’s is some events that could reveal an active attack before indicators of

Industrial & OT Security

In the IoT Ecosystem, Not too long ago in history, the idea that people and objects could be inter-connected would

Opsec definition Operations security, or opsec, is a process by which organizations assess and protect public data about themselves that

The Industrial Internet of Things (IIoT) is made up of interconnected sensors, instruments and other devices networked together with ICS/SCADA


In the latest major cloud security foul-up, Capital One suffered a data breach, which affected 100 million people in the

CASB definition Think of cloud access security brokers (CASBs) as central data authentication and encryption hubs for everything your enterprise

Research shows that organizations are moving systems and data to the cloud in rising numbers. Security when working in the



Sign up for our newsletter and get access to our latest cyber security news, industry through-leadership, latest information about security products and solution, security conferences and events.

Email address
Secure and Spam free...