Blog
Shady Android VPN Application That Allowed MiTM Attacks Is Removed By Google
Google have recently removed a shady Android VPN App from the Play Store. Identified as SuperVPN Free VPN Client, this app boasted 100 million installs...
Reasons Why You Should Choose a Career in Cyber Security
We live in a digital age! From searching even the tiniest piece of information to ordering food and other services online; we’re totally dependent on...
A Bug From Twitter Allowed Firefox To Store Cached Files Shared Via Direct Messages
Twitter has recently disclosed a vulnerability that indirectly affected users’ privacy. As disclosed, this Twitter bug allowed a browser to store cached...
Ethical Hacking Training Course Online- Tips on Choosing The Right Course
Almost all of us have a general notion of which field we want to pursue our careers in. However, selecting the best course that can provide you with...
Helpful Guide for Certified Ethical Hacker Exam
Preparing for the CEH exam and need some helpful guidelines to do well? We’ve got you covered. In this blog, we will provide you with all the necessary...
VPNs Are Stopped by Unpatched iOS Vulnerability From Thorough Traffic Encryption
While Apple has built a credible stance regarding users’ privacy, a bug has recently made shown otherwise. As discovered, an unpatched vulnerability...
Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
Security experts have reported two such sites where this software could be found. It comes with bot management features including restarting and shutting...
Social Engineering Penetration Testing – Methods and Steps
If you’ve read our previous blog, you may be aware of what social engineering penetration testing is. But if you haven’t, we advise that you give a quick...
Slack Addresses Potential Account Takeover Bug
There was a big threat to shared private data, channels, and conversation leak from the Slack platform. Slack addressed a critical flaw within 24 hours...