Category: cybersecurity

Smart toys sold on Amazon are vulnerable to hacking
cyber, cyber security

Smart toys sold on Amazon are vulnerable to hacking

Smart Toys which were purchased heavily during this year’s shopping season are said to be extremely vulnerable to hackers. This was the truth revealed by ... Read More

New Linux vulnerability allows hijacking VPN connections on Unix systems
article, cybersecurity

New Linux vulnerability allows hijacking VPN connections on Unix systems

Researchers from the University of New Mexico have unearthed a vulnerability that can be used by an attacker to determine if a user is connected ... Read More

Three Fundamental Security Myths in Cyber Security Domain and Reasons for Being Vulnerable
BugBountywriteup, cybersecurity

Three Fundamental Security Myths in Cyber Security Domain and Reasons for Being Vulnerable

Conflicting information and stories on online security are a part of the internet culture. Myths are powerfully integrated into our general knowledge. Their existence is ... Read More

ENTER TO WIN A NINTENDO SWITCH WHILE TAKING FREE PROFESSIONAL DEVELOPMENT COURSES
(ISC)2, cyber

ENTER TO WIN A NINTENDO SWITCH WHILE TAKING FREE PROFESSIONAL DEVELOPMENT COURSES

This post was originally published by (ISC)² Management. (ISC)² members and associates have an exclusive opportunity to win a Nintendo Switch while earning CPEs. This ... Read More

Jewelry to unlock an iPhone or authenticate a digital payment
Access Control, biometrics

Jewelry to unlock an iPhone or authenticate a digital payment

As biometrics are replacing the passwords and pins, a company has come up with jewelry which has an embedded fingerprint used to authenticate a digital ... Read More

North Korean hackers adopt a new technique to infect macOS machines
article, cybersecurity

North Korean hackers adopt a new technique to infect macOS machines

The Lazarus group, which considered to be one of the North Korea's state-sponsored hacking units, has been found to be using a new piece of ... Read More

cybersecurity, vulnerability

Red Hat update for firefox

Red Hat update for firefox . Red Hat update for firefox Security feed from CyberSecurity HelpSource link Read More

Cyber Threats to Healthcare on the Rise
(ISC)2, Certification

Cyber Threats to Healthcare on the Rise

Hospitals are set up to fight infections, but not necessarily the kind that has been plaguing healthcare institutions lately – malware. A new report estimates ... Read More

HackTheBox Write-up Bashed
BugBountywriteup, cybersecurity

HackTheBox Write-up Bashed

This is the write-up of the Machine BASHED from HackTheBox.DIGESTBashed is an easy machine based on the phpbashshell, cronjob is exploited to get the root, ... Read More