It pays more to be a white hat than a dark one, as proven in the Pwn2Own event in Toronto, Canada. Aside from being regulars at...
Lazarus Group in the Crosshairs Because of Axie Infinity The play-to-earn game Axie Infinity quickly became a hit because it allowed its players not just to...
“Guys, I thought we were in a hurry. And Diego, spit that out. You don’t know where it’s been.” –Manny the Mammoth, Ice Age (2002) That’s...
Enterprises using both VMWare and Microsoft Windows Defender need to be wary of Cobalt Strikeattack. Apparently, threat actors have managed to find out how to deploy...
Realtek Wi-Fi modules are ever-present in wireless devices, mainly laptops. Flaws in these modules are potential security risks for devices that use them; and a flaw...
Hacking bounties are not limited to cybersecurity professionals and their client companies. Thanks to the continuing popularity of cryptocurrency, such as the recent streak of Bitcoin...
Zero-day attacks can be prevented by using intense network security infrastructure and protocols, something New York City’s Metropolitan Transportation Authority (MTA) apparently lacked after Chinese-backed hackers...
We’re only human, has never been a good excuse when being confronted with a mistake. Cybersecurity experts don’t find it much of an excuse either, but...
Chrome is the world’s most recommended browser and many browsers, including Microsoft’s is based from it. However, Chrome can be a memory hog, until The Great...
It’s no surprise that threat actors would take advantage of the current worldwide situation and come up with a tailor-made solution. This time, with everyone’s anxious...