Nokia 9 PureView Featuring Five Rear Cameras Launched In India

After much wait, HMD Global-owned Nokia has finally made its

Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar

One of the most powerful, infamous, and advanced piece of

BMW Mini Cooper Electric Unveiled: Is It As Good As A Tesla?

After months of speculation, the BMW Mini Cooper Electric is

Gesture Navigation In Android Q Beta 5 Doesn’t Work With Third Party Launchers

Google introduced gesture navigation for the first time with Android

IBM Completes The $34 Billion Red Hat Acquisition

International Business Machines Corporation (IBM) has completed its acquisition of

This Is How Your Favorite Netflix Movies And Shows Are Pirated

A person who is a part of the pirate world

UPDATE: OWASP Dependency-Check 5.1.0

My first post about this open source OWASP project was

Marriott Faces $123 Million GDPR Fine Over Starwood Data Breach

After with a record fine of £183 million earlier this

Microsoft Releases July 2019 Security Updates, 2 Flaws Under Active Attack

Microsoft today released its monthly batch of software security updates

Unpatched Prototype Pollution Flaw Affects All Versions of Popular Lodash Library

Lodash, a popular npm library used by more than 4

Watch Out! Microsoft Spotted Spike in Astaroth Fileless Malware Attacks

Security researchers at Microsoft have released details of a new

Flaw in Zoom Video Conferencing Software Lets Websites Hijack Mac Webcams

If you use Zoom video conferencing software on your Mac

Linux for Pentester: pip Privilege Escalation

The main objective of this article is to make attentive

British Airways Fined £183 Million Under GDPR Over 2018 Data Breach

Britain’s Information Commissioner’s Office (ICO) today hit British Airways with

Ubuntu-Maker Canonical’s GitHub Account Gets Hacked

An unknown hacker yesterday successfully managed to hack into the

Linux for Pentester: git Privilege Escalation

In this article, we will understand a very dominant command

The Logic of a Classic Advanced Persistent Threat Attack

Story of an Advanced Persistent Threat attack against a large

How to build a “human firewall” for your business

What is a human firewall? In cyber security, a firewall