
“Too Much Information” Millions of Social Profiles Leaked by Chinese Data-Scrapers
A cloud misconfiguration by the Chinese social media management company SocialArks exposed 318 million records from [...]
“Deframed” Zend Framework Remote Code Execution Vulnerability Revealed
An untrusted deserialization vulnerability in the Zend Framework was disclosed this week. If exploited by [...]
The Critical Golang XML Parser Bug Can Cause SAML Authentication Bypass
How the Critical Golang XML parser bug cause SAML authentication bypass? Security researchers at Mattermost, [...]
Vulnerability Scanning and Penetration Testing – Know the Difference
There are a variety of different ways to assess the security integrity of the systems [...]
“Wormhole” Wormable Zero-Click Vulnerability in Microsoft Teams
A Security Engineer at Evolution Gaming has discovered a Cross-site Scripting (XSS) vulnerability on the [...]
“Dark tidings” Recent Oracle WebLogic vulnerability exploited by DarkIRC Malware
A Remote Code Execution vulnerability, in the Oracle WebLogic Server, was recently discovered. The Oracle [...]
How Much Does an ISO 27001 Certification Cost?
ISO 27001 is an internationally recognised standard for information security management systems (ISMS). It provides [...]
Google Services Weaponized to Bypass Security in Phishing
There was a spike in Phishing and business email compromises due to threat actors exploiting Google [...]
Top 5 Signs of Social Engineering Attacks
What are the Signs of a Social Engineering Attack and How Can You Prevent Them? [...]