Recently, SonicWall issued a security advisory to fix a high vulnerability in SionicOS that could lead to remote code execution. Read more »
There are some steps that you need to follow in order to safeguard your kindle and make sure that the data stays protected all the time. Follow these steps in order to... Read more »
A team of five ethical hackers finds a total of 55 Apple vulnerabilities. Apple reacted quickly to the bug reports by fixing them in time. Read more »
Github Code scanning is a feature to examine the code in your repository to identify security vulnerabilities and encoding errors. Read more »
KuCoin cryptocurrency exchange located in Singapore CEO Johnny Lyu confirmed a mega crypto hack attack worth over $150 Million. Read more »
Microsoft is tracking threat actor activity using the CVE-2020–1472 Netlogon EoP vulnerability exploit called Zerologon. They have seen attacks where public vulnerabilities have been inserted into attackers playbooks. According to security industry... Read more »
Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the data in use. Confidential computing uses hardware-based techniques to detach data, individual... Read more »
Location Tracking risks and Location tracking prevention best practices. 1. Turn off location services in your device’s settings. 2. Disable wireless radios when you are not using them. Read more »
The Great Firewall of China (GFW) started blocking ESNI — one of the key features of TLS 1.3 and HTTPS. The Chinese government has deployed an upgrade to its Great Firewall (GFW)... Read more »
Intel data leaked over 20 GB in online file sharing websites like Mega. Intel is investigating a major leak from internal business files. Read more »