Offensive cybersecurity threat hunting

From defensive to offensive cybersecurity: organizations’ most essential security measures

Cybersecurity has turned into one of the fundamental components of any organization in the last two decades. The world has evolved; leading to the advance in technology and alongside it, threats. Organizations need to invest more in building a strong, functional cybersecurity infrastructure to protect their facilities and assets from internal and external threats. Before,…

Intel Logo

Intel Patches Security Vulnerabilities in Latest Update

Intel addressed medium and high-severity vulnerabilities in its April 2020 security update; the vulnerabilities in Intel software and firmware programs could potentially allow attackers to launch denial-of-service (DoS) attacks and enables escalation of privilege. Out of the 6 vulnerabilities Intel addressed in the security update published on April 14, 3 of them were patched, and…

Google Chrome Malicious Extensions

Google Removes 49 Malicious Chrome Extensions Used for Stealing Cryptocurrency

Google has removed 49 malicious Chrome browser extensions from its Web Store that contained codes used for hijacking cryptocurrency and stealing sensitive information. Cybersecurity researchers at MyCrypto and PhishFort discovered a range of malicious Chrome extensions targeting brands and cryptocurrency users. Google removed the malicious extensions within 24 hours. Some of the extensions have had…

fingerprint authentication- 3D printers

3D printers can trick fingerprint authentication

For nearly a decade now, fingerprint authentication has been a quicker and easier alternative for password security for smartphones and laptops. The early forms of fingerprint authentication were quickly bypassed; nevertheless, ever since the debut of Apple’s TouchID in the iPhone 5 seven years ago, the technology has become more advanced. However, researchers are now…