How to Optimize Your Database Storage in MySQL

SQL (structured query language) is a unique programming language for storing, manipulating, and retrieving data from a database. The language is applied in multiple relational database systems, including Postgres, Oracle, MySQL, and SQL Server, among others. Using SQL statements, developers...

/ May 23, 2022

Yes, Containers Are Terrific, But Watch the Security Risks

Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don’t mitigate these risks are vulnerable to attack. In this article, we outline how containers...

/ May 23, 2022

ISaPWN – research on the security of ISaGRAF Runtime

In early 2020, we notified the Rockwell Automation Product Security Incident Response Team (RA PSIRT) of several vulnerabilities we had identified in the ISaGRAF Runtime execution environment. According to public sources of information, ISaGRAF Runtime is used as an automation...

/ May 23, 2022

Hackers Distribute Vidar Malware By Tricking Users with Fake Windows 11 Downloads

Hackers are tricking users with fake Windows 11 installers loaded with Vidar info stealer spreading through newly registered phishing domains. The cybersecurity analysts at Zscale security firm have detected that the malicious ISO files were included on the spoofed websites...

/ May 23, 2022

Mozilla Firefox Hacked Within 8 Seconds At The Vancouver Hacking Event

Posted on May 22, 2022 at 7:55 PM The Pwn2own hacking event in Vancouver has proven that companies need to do a lot more to make their software safe. The event exposed flaws in Ubuntu Desktop, Microsoft Teams, Windows 11,...

/ May 22, 2022

5 Casual Games You Can Play on Your Mobile Browser Now

Online gaming has always been the buddy of leisure time because they allow us to bring some enjoyment to our lives after spending some hectic time. That’s why online games are the love of everyone irrespective of age and gender....

/ May 21, 2022

Top Hackers Tussle To Scoop Tesla’s $600,000 Reward At Pwn2Own Event

Posted on May 21, 2022 at 9:02 PM A hacking competition in Vancouver, Canada, has attracted some of the world’s best hackers in the industry. Their goal is to break into highly secured technology, including Tesla car, Apple’s Safari browser,...

/ May 21, 2022

A Short Guide to Understanding the Exciting Realm of Fintech

Fintech is skyrocketing in popularity, posing the first serious challenge to legacy financial institutions. What is it & how does it work? Find out here. What is Fintech & How Does it Work? People used to stand on the corner...

/ May 21, 2022

Windows 11 And Teams Among Hacked Software On The First Day Of Pwn2Ow

Posted on May 21, 2022 at 7:24 AM Microsoft’s latest iteration of its software is another example of how the tech giant is taking a massive security-based stance to protect against future software infiltrations. In the latest Pwn2Own hacking competition,...

/ May 21, 2022

Researchers Find Backdoor in School Management Plugin for WordPress

Multiple versions of a WordPress plugin by the name of “School Management Pro” harbored a backdoor that could grant an adversary complete control over vulnerable websites. The issue, spotted in premium versions before 9.9.7, has been assigned the CVE identifier...

/ May 21, 2022

Tesla Model 3, Ubuntu Desktop & Windows 11 Hacked – Pwn2Own Day 2

Pwn2Own Vancouver 2022 contestants demonstrated three zero-day exploits on the second day of the competition: a hack of Windows 11,  a hack of the infotainment system of the Tesla Model 3, and exploits for two bugs in Ubuntu Desktop. On...

/ May 21, 2022

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

Cisco on Friday rolled out fixes for a medium-severity vulnerability affecting IOS XR Software that it said has been exploited in real-world attacks. Tracked as CVE-2022-20821 (CVSS score: 6.5), the issue relates to an open port vulnerability that could be...

/ May 21, 2022