New Hacker101 Content: Threat modeling, Burp basics, and more
Since January, thousands of hackers have expressed their enthusiasm for the first Hacker101 content drop (almost 80,000 total video views and more than 8,800 stars…
Since January, thousands of hackers have expressed their enthusiasm for the first Hacker101 content drop (almost 80,000 total video views and more than 8,800 stars…
There are all kinds of apps on Facebook – quizzes, games and corporate sweepstakes. But it might be a good idea to keep track of…
At the beginning of May, Google released eight new top-level domains (TLDs)—the suffixes at the end of URLs, like “.com” or “.uk.” These little addendums…
When looking for a model to inform your own security posture, the Department of Defense would be a good place to look. Not only were…
You might have noticed that Google occasionally flags some websites with a “This site may be hacked”-flag or a “This site may harm your computer”-flag.…
May 21, 2023Ravie LakshmananSoftware Security / Malware The maintainers of Python Package Index (PyPI), the official third-party software repository for the Python programming language, have…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Apple fixes WebKit 0-days under attack (CVE-2023-28204, CVE-2023-32373, CVE-2023-32409)Apple has…
GDPR is finally upon us. The onslaught of “we’ve updated our privacy policy” emails to your inbox should have been an indicator…as well as the…
Joomla is a widely used open-source Content Management System that simplifies working with sites and web applications. To help you keep up to date on Joomla…
The h1-702 2018 CTF is here! H1-702 2018 is happening in Las Vegas from Wednesday, August 8 to Sunday, August 12! HackerOne 1337 will be…
In an ever changing world, nothing has a faster pace than IT, and the person in the lead of this change is the CIO. The…
Since Arvind Krishna became the CEO in April 2020, IBM has acquired more than 30 companies. They made their 5th acquisition with Polar Security after…