The Pros and Cons of Smart Homes
The world is more connected than ever before, and the rise of the smart home is just one…
May 23, 2023
Are Smart Home Devices Invading Your Privacy?
Smart home devices are becoming more and more popular in recent years, promising convenience and automation to enhance…
April 17, 2023
Cybercriminals Exploit CAN Injection Hack to Steal Cars
If it is connected, it is vulnerable; in this case, a Toyota RAV4 model was stolen within two minutes.
April 9, 2023
Tesla Employees Allegedly Shared Customers’ Private Videos and Photos
The use of cameras on Tesla vehicles has come under scrutiny after reports revealed that some employees have…
April 8, 2023
How New Cybersecurity Regulations Are Shaping the Medical Device Industry
Here’s a rundown of the impact of new cybersecurity regulations as they are applied to the medical device industry.
February 27, 2023
Mirai Variant V3G4 Exploiting IoT Devices for DDoS Attacks
The V3G4 malware was caught leveraging several vulnerabilities in IoT devices to spread its infection from July to December of 2022.
February 16, 2023
Controller-level flaws can let hackers physically damage moving bridges
Sophisticated hackers can now breach vulnerable networks and devices at the controller level of critical infrastructure, causing physical damage to crucial assets.
February 15, 2023
Cloudflare thwarts largest reported HTTP DDoS attack
A new record has been set for the largest reported HTTP DDoS attack, exceeding the previous record of 46 million requests per second (rps) in June 2022.
February 14, 2023
EV Charging Stations at Risk of DoS Attacks
Although a fix is available to patch vulnerabilities, the EV industry is slow in applying the updates.
February 3, 2023
What is an OSINT Tool – Best OSINT Tools 2023
An OSINT tool is a must for every researcher - In this article, we will explore the 15 best OSINT tools that you can use for your investigations.
February 2, 2023