Microsoft 365 adds new features to monitor employee activity
Microsoft has added new features to Office Suite 365 that enable organizations…
Telegram has implemented a panic button to block data leaks
Corpsoft24, a company specializing in the provision of cloud services, has developed…
Scan Open Ports With Nmap – Full Tutorial
1 What is nmap? Nmap, short for Network Mapper, is a free,…
Mitaka – Powerful OSINT Tool on Chrome
When trying to search the IOC (Indicator of Compromise) for IP addresses,…
Chinese hackers renewed spying on Vatican
Chinese cybercriminal group Mustang Panda (also known as TA416 and RedDelta) has…
CPanel 2FA can be bypassed
Security researchers of the information security company Digital Defense have discovered a…
Linux Trojan Stantinko Now Disguises As Apache Web Server
Operators of one of the oldest active botnets in existence today, Stantinko,…
Scientists turn a robot vacuum cleaner into a spy device
Household robotic vacuum cleaners can be hacked remotely and eavesdropped on conversations,…
Hackers add fraudulent online stores on top of WordPress sites
A new cybercriminal group attacks WordPress sites and installs hidden e-commerce stores…
GitHub fixed a dangerous vulnerability two weeks after disclosing details
The GitHub developers have finally fixed a high-risk vulnerability that researchers from…