SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
Now that Elon Musk is investing in bitcoins, people may forget that it is still possible to hack bitcoin and other cryptocurrencies. Just like the incident that happened in 2014. When hackers stole $350 million from an exchange in Tokyo. Or the incident of DAO, when hackers stole $60 million worth of virtual currency. All…
For the past few months, an organized attack campaign is targeting misconfigured open Docker Daemon API ports to spread the Kinsing malware which is designed for crypto mining. The Kinsing malware is a Linux-based malware that contains a crypto miner that spreads through containers with the purpose of mining the Bitcoin cryptocurrency. According to Gal…
Want to know how much is the economic cost of cybercrime for Australians? Well, approximately $29 billion every year. While the Gross Domestic Product of Australia equals $1500 billion per year, they have to pay $29 billion every year, to remediate cyber attacks’ damages. In another word, they are paying 2 percent of their nation’s…
COMB (Compilation of Many Breaches) is known as the biggest data breach of all time. The breach let hackers access more than 3.2 billion unique pairs of emails and passwords. The planet has a population of 7.8 billion, of which 3.2 billion people’s data has been stolen. In the other words, 40% of the earth’s…
The latest vulnerabilities of Cyberpunk 2077 and PC gamers who are in potential danger The latest updates about the vulnerabilities of Cyberpunk 2077, disappointed the fans of this game once again. The destructive power of the discovered security gaps is enough to let hackers take over the control of your PC. In the other words,…
Apple has rewarded a security researcher $75,000 bug bounty after he discovered Apple Safari vulnerability and macOS camera vulnerability; the flaw would allow attackers to hijack the camera and microphone on any iPhone or Mac computer. Ryan Pickren, an ethical hacker, disclosed seven vulnerabilities in Apple’s Safari browser; three of which could have been exploited…
Despite all that companies do as data breach compensation, there are still thousands of people who are losing their jobs due to data breaches every day. Undoubtedly, data breaches are one of the most important reasons for what we know as the “Unemployment crisis”. However, the unreliability of official reports has turned data breaches to…
According to the recent report from “Project Zero”, Apple has added a new iOS security feature to the Systems that ate under its control. This is one of the most critical discoveries of project zero since July 15th of 2014 that the security analysts of Google, started their carrier. Why? Because it demonstrates the importance…
With the recent undeniable growth of IT knowledge and cyber-based specialty in the last decade, the number of individuals gaining interest in learning and using cyber skills as a way to make a living is increasing every day. From an introverted teenager living in their basement in southern Europe who’s in love with hacking and…
NThere are newly available details about the new exploitable Windows vulnerability that was addressed by Microsoft on its monthly Patch Tuesday updates. The founded exploitable windows vulnerability has made a security gap inside the suite of Microsoft security protocols. Protocols that users know as NTLM (New Technology LAN Manager) are structured to provide authentication, integrity,…