HackerOne Fires Employee for Stealing Bug Reports, Collecting Bug Bounties

Bug bounty and vulnerability coordination platform HackerOne has fired an employee for using their position to access customers’ vulnerability data and selling duplicated data back to them to make money.…

What Are Common Cyber Threats to Manufacturers and How Can They Secure Themselves

In today’s digital age, manufacturers increasingly rely on technology to run their businesses. However, this dependence also makes them more vulnerable to cyberattacks. Cyber threats come in many forms and…

How SAST Will Improve Your Overall Security: Intro

Application testing is a process that helps ensure the quality and safety of your software applications, whether the app is for a mobile or desktop device. Of course, it’s easy…

Hackers Exploit Harmony’s Horizon Blockchain Bridge to Steal $100 Million

The main bridge of layer-1 blockchain between Binance Chain, Ethereum, and Bitcoin was exploited, but the BTC bridge isn’t impacted. Harmony’s Horizon Bridge is the latest to be hacked. According…

Chinese Hackers Distributing Nim language Malware in SMS Bomber Tool

This newly discovered malware campaign is attributed to a Chinese hacking group called Tropic Trooper. Cybersecurity researchers at Check Point have shared details of a new malware campaign suspected to be launched…

Flaws in Smart Jacuzzi App Could Be Exploited To Extract Users’ Data

The vulnerability existed in Jacuzzi Brand LLC’s SmartTub app web interface that could reveal users’ private data to remote malicious attackers. Researchers have identified vulnerabilities in Jacuzzi Brand LLC’s SmartTub…

Authorities Suspect Cyber Attack Behind False Rocket Sirens in Israel

Authorities in Israeli cities were alarmed after prolonged siren alerts on Sunday evening and some believe it is the work of Iranian hackers. False rocket warning sirens were heard in…

Network Pentesting Checklist

Network pentesting is a frequently used and successful method of recognizing security issues in a company’s IT infrastructure. This entails completing a vulnerability scan of the IT system by “ethically…

5 Reasons You Should Learn About Cyber Security

In this technological era, the world has been converted into a global village with everything connected to everything. The internet plays a massive role in this revolution, thanks to the…

9 Years Jail for iCloud Phishing Scam Hacker Who Stole Nude Photos

The hacker was arrested in 2021 for breaching Apple iCloud accounts and stealing more than 620,000 private images and 9,000 videos of young females. Hao Kuo Chi, a 41-year-old hacker…