A team of five ethical hackers finds a total of 55 Apple vulnerabilities. Apple reacted quickly to the bug reports by fixing them in time. Read more »
Github Code scanning is a feature to examine the code in your repository to identify security vulnerabilities and encoding errors. Read more »
KuCoin cryptocurrency exchange located in Singapore CEO Johnny Lyu confirmed a mega crypto hack attack worth over $150 Million. Read more »
Microsoft is tracking threat actor activity using the CVE-2020–1472 Netlogon EoP vulnerability exploit called Zerologon. They have seen attacks where public vulnerabilities have been inserted into attackers playbooks. According to security industry... Read more »
Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the data in use. Confidential computing uses hardware-based techniques to detach data, individual... Read more »
Due to the pandemic, Apple will be releasing the new iPhone 12 Soon. Read more about iPhone 12 Pricing, spec, etc... Read more »
Kubernetes v1.19 (Accentuate the Paw-sitive) released with 34 enhancements (10 stable, 15 beta, and 9 alpha). Read more to see new features and changes in Kubernetes v1.19 . Read more »
Here we explained top 8 chatting apps or messanging apps that encourage you to make conversations very safely and securely. Read more »
The Great Firewall of China (GFW) started blocking ESNI — one of the key features of TLS 1.3 and HTTPS. The Chinese government has deployed an upgrade to its Great Firewall (GFW)... Read more »
Intel data leaked over 20 GB in online file sharing websites like Mega. Intel is investigating a major leak from internal business files. Read more »