Cyber Security

5 Hackers uncovered 55 vulnerabilities in Apple services within 3 months

A team of five ethical hackers finds a total of 55 Apple vulnerabilities. Apple reacted quickly to the bug reports…

4 years ago

GitHub launched dev-first code scanning to find vulnerabilities

Github Code scanning is a feature to examine the code in your repository to identify security vulnerabilities and encoding errors.

4 years ago

Crypto Exchange KuCoin mega hack, $150M+ worth token stolen

KuCoin cryptocurrency exchange located in Singapore CEO Johnny Lyu confirmed a mega crypto hack attack worth over $150 Million.

4 years ago

Attackers actively Exploiting ZeroLogon Windows Vulnerability

Microsoft is tracking threat actor activity using the CVE-2020-1472 Netlogon EoP vulnerability exploit called Zerologon. They have seen attacks where…

4 years ago

What is Confidential Computing? Everything you need to know

Confidential computing is a practice in which encrypted data stored in memory to restrict access for the security of the…

4 years ago

Location Tracking Risks and Protection

Location Tracking risks and Location tracking prevention best practices. 1. Turn off location services in your device’s settings. 2. Disable…

4 years ago

The Great Firewall of China started blocking ESNI to Censor more content

The Great Firewall of China (GFW) started blocking ESNI — one of the key features of TLS 1.3 and HTTPS.…

4 years ago

Exconfidential Lake – Intel investigating 20GB data leak

Intel data leaked over 20 GB in online file sharing websites like Mega. Intel is investigating a major leak from…

4 years ago

Microsoft announced public preview of Double Key Encryption

Microsoft introduced Double Key Encryption preview for data generated with Microsoft 365 applications using two keys to access secure information,

4 years ago

Meow Cyber Attack wiped data of 4000+ Databases

Unprotected Elasticsearch and MongoDB were targeted against hacking attacks. The attacker leaves Meow Signature on the logs after removing data.

4 years ago

TheEncrypt uses cookies.