Latest Cybersecurity News

What is common with CCPA, SHIELD, LGPD, DPB and GDPR?

All these data protection laws are focused in securing personal data of the end users/residents/citizens, and to do that strong…

5 years ago

A new zero-day vulnerability discovered in Internet Explorer

Microsoft has issued a security advisory- ADV200001 yesterday against a new zero-day vulnerability discovered in the Internet Explorer and it…

5 years ago

A story of motivation-The infancy, childhood, teenage, and adulthood of Red Hat.

It all began when a hacker named Marc Ewing, started crafting this new distribution of Linux on CDs from his…

5 years ago

Guide to Bug Bounty: How to implement it effectively

Bug bounty program is a process of identifying vulnerabilities and bugs within a network or a software, organized by a…

5 years ago

4 reasons enterprises should double check their USB security

Compromised USB drives interacting with the corporate network can result in heavy damages to enterprises. System administrators need to define the…

5 years ago

Intruder detection and its benefits for security professionals

The Intrusion Detection System (IDS) is used for detecting the malicious traffic that enters the corporate network and sends an…

5 years ago