Zoom Taps Ex-Facebook CISO Amid Security Snafus, Lawsuit
Category: Uncategorized
Interest In Zoom Zero-Day Hacks Is Sky-High As Meetings Move Online
Interest In Zoom Zero-Day Hacks Is Sky-High As Meetings Move Online
Zoom Working on Security Improvements Amid More Bans
Zoom Working on Security Improvements Amid More Bans
German foreign ministry limits the use of Zoom over security concerns
German foreign ministry limits the use of Zoom over security concerns
Threat Roundup for September 27 to October 4
Talos publishings a glimpse into the most prevalent threats They’ve observed between Sep. 27 to Oct 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize […]
New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild
Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world’s most widely used mobile operating system, Android. What’s more? The Android zero-day vulnerability has also been found to be exploited […]
Extensive list of useful mindmaps
This extensive list of mindmaps contains a wealth of information and useful links to help in the management and implementation of diverse and sometimes complex technology and cybersecurity subjects:
Threat Roundup for September 20 to September 27
Talos is publishing a glimpse into the most prevalent threats they’ve observed between Sep. 20 to Sep 27. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post summarizes […]
Hacker Releases ‘Unpatchable’ Jailbreak For All iOS Devices, iPhone 4s to iPhone X – USB Access Required!!!
An iOS hacker and cybersecurity researcher today publicly released what he claimed to be a “permanent unpatchable bootrom exploit,” in other words, an epic jailbreak that works on all iOS devices ranging from iPhone 4s […]
Russian APT Map Reveals 22,000 Connections Between 2000 Malware Samples
Though Russia still has an undiversified and stagnant economy, it was one of the early countries in the world to realize the value of remotely conducted cyber intrusions. In recent years, many Russia hacking groups […]