Cybersecurity Blog
CISA Urges Software Devs to Weed out Path Traversal Vulnerabilities
Path traversal vulnerabilities, also known as directory traversal, can be exploited by attackers to manipulate critical ...
Android Bug can Leak DNS Traffic With VPN Kill Switch Enabled
The Android bug discovered by a Mullvad VPN user reveals that Android devices can leak DNS queries even with the ...
“Dirty Stream” Attack Affects Popular Android Apps
A vulnerability in popular Android apps like Xiaomi File Manager and WPS Office could allow malicious apps to overwrite ...
More Than Two Dozen Android Vulnerabilities Fixed
Xiaomi resolved 20 flaws, ensuring user safety by fixing issues like arbitrary access to system components and data ...
North Korean Hackers Spoofing Journalist Emails to Spy on Experts
North Korean threat actors, specifically the Kimsuky group, are exploiting weakly configured DMARC protocols to spoof ...
DeepKeep Secures $10M in Seed Funding to Boost GenAI Protection Endeavors
Founded in 2021 by Rony Ohayon, DeepKeep specializes in AI-Native Trust, Risk, and Security Management (TRiSM). The ...
reNgine: Open-Source Automated Reconnaissance Framework for Web Applications
Developed to address limitations in existing tools, reNgine is beneficial for bug bounty hunters, penetration testers, ...
Cybersecurity Consultant Arrested After Allegedly Extorting IT Firm
Vincent Cannady, a former cybersecurity consultant, was arrested for allegedly extorting a publicly traded IT company by ...