1. Blog/
  2. News

New Linux error allows hacking into encrypted VPN connections

Satoshi Nakamoto December 23, 2022

A group of cyber security research workers has revealed a brand new severe vulnerability impacting many Linux and also Unix-like systems, including FreeBSD, OpenBSD, Mac-OS,…

Work from Home? Microsoft Edge V84 is a good reason to Ditch Chrome

Satoshi Nakamoto December 2, 2022

  After a long journey of Microsoft internet explorer and less welcoming to the initial MS Edge web browser version, Microsoft is now curious to…

Hackers vs Hackers: Intrusion Truth Group deanonymized Chinese APT17 members

Robert Knight November 18, 2022

The anonymous grouping of Intrusion Truth continues to deanonymize Chinese "government hackers." This time, the data on the alleged members of APT17 were made public.…

What is a CA Certificate and How Does It Work?

Robert Knight September 10, 2021

A virtual private network (VPN) is set up using a tunneling protocol, which is typically layered and encrypted. To establish the VPN connection, it is…

Insulting comments in Instagram

Robert Knight August 20, 2021

Earlier this year one of the most popular Instagram applications launched a new feature. Its main task is to analyze written comments and warn the…

Top 7 Cyber Security Threats to Watch Out For

Satoshi Nakamoto August 6, 2021

While it might seem obvious to some, many might wonder: why even bother making a list of the most important cyber security threats? Experts certainly…

New tools to improve data security

Satoshi Nakamoto July 22, 2021

The human factor has been and remains the “Achilles heel” of data hacking. Multi-factor authentication can be an important step towards establishing digital identity control…

Hackers are Exploiting WP File Manager Flaw

Robert Knight September 7, 2020

Vulnerability in the File Manager WordPress plugin has more than 700,000 active installations & 52% of the users are affected. Bugs, flaws, and vulnerabilities always…