Information Security (Page 70)

Ethical hacking is a field in constant evolution, so it is necessary that researchers are always informed about the latest trends in terms of tactics, hacking groups and security tools.Read More →

In its third quarter 2021 earnings report, Scottish multinational engineering firm Weir Group revealed that a hacking group tried to infect its computer networks with ransomware last September, leading toRead More →

Cybersecurity specialists report the discovery of two critical vulnerabilities in the CCTV cameras of the technology firm Dahua Technology for which a proof of concept (PoC) exploit is already available.Read More →

Building secure applications requires much more than just the knowledge of developers, as a properly protected environment requires an adequate analysis and the use of good security tools. That isRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Apple AirTag whose exploitation would allow threat actors to find the phone number of a target user and even redirectRead More →

Cybersecurity specialists report the detection of a critical vulnerability in Windows Platform Binary Table (WPBT) whose exploitation would allow threat actors to perform great damage on Microsoft systems launched fromRead More →

Let’s Encrypt is currently the most important certification authority for Transport Layer Security (TLS) encryption thanks to its sophisticated automated processes for validating, signing, installing and renewing certificates for secureRead More →

According to a report by security firm Comparitech, the confidential information of more than 106 million tourists in Thailand was exposed on the Internet without any protection, leaking confidential recordsRead More →