Web server pentesting is performed under 3 significant categories: Identity, Analyse, and Report Vulnerabilities such as authentication weakness, configuration errors, and protocol…
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: MOVEit Transfer zero-day attacks: The…
Organizations dealing with card payment data must comply with the Payment Card Industry Data Security Standard (PCI DSS) to protect…
Zyxel has published a security advisory containing guidance on protecting firewall and VPN devices from ongoing attacks and detecting signs…
Online sellers are targeted in a new campaign to push the Vidar information-stealing malware, allowing threat actors to steal credentials…
A vulnerability that was only recently found and given the name “Migraine” is connected to macOS migration functionality and represents…
Code hidden inside PC motherboards left millions of machines vulnerable to malicious updates, researchers revealed this week. Staff at security firm…
Google Drive is one of the most used cloud-based storage platforms, and due to its immense popularity and capabilities, it’s…
When Aparna Pappu, vice president and general manager of Google Workspace, spoke at Google I/O on May 10, she laid…
Splunk is one of the most used SIEM (Security Incident and Event Management) tools worldwide. Splunk can collect logs of…
Jun 03, 2023Ravie LakshmananPrivacy / Technology The U.S. Federal Trade Commission (FTC) has fined Amazon a cumulative $30.8 million over…
It’s Time to Get Proactive About Risk Reduction By Marc Gaffan, CEO of IONIX The first quarter of 2023 is…