Security Researchers demonstrated at the Def Con hacker conference how it is easy to open some Bluetooth-based smart locks. Last…
A group of experts devised a technique dubbed DiskFiltration to exfiltrate data from air-gapped networks relying on acoustic signals emitted…
Is it possible to hack voting machines? According to cyber security experts, it is possible due to the use of…
Information warfare - The development of cyber capabilities is strategic for any governments, computer systems and Internet of Things even…
Today I have interviewed RootPhantom, another member of the popular hacker crew Phantom Squad. Enjoy the interview! You are…
A severe design flaw in the Linux kernel could be exploited by attackers to hijack traffic, inject malware into connections,…
Once again Microsoft failed in fixing a severe Secure Boot vulnerability that can be exploited to install rootkits on Windows…
The bug hunting company Exodus announced its bug bounty program. Who will pay more for a 0-day exploit? Reflecting on…
Today I have interviewed Claudio Caracciolo (@holesec) one of the most renowned Security Professional that works like Chief Security Ambassador for…
A team researchers at Arizona State University (ASU) is crawling the Darkweb searching for zero-days for Proactive Cybersecurity Threat Intelligence…
This website uses cookies.