Security

guy wearing glasses with reflection showing dashboard and numbers in the background

Cyber Espionage Attacks: How to protect your Data?

Espionage refers to the process of obtaining or divulging confidential and highly classified information without the owner’s permission. Cyber-espionage thus refers to the use of computer networks and computer devices to wrongfully obtain data belonging to a government or institution to use it to cause harm to the owner. Cyber-espionage has been used to commit […]

Cyber Espionage Attacks: How to protect your Data? Read More »

Isometric screen with a shield in the middle and a heap of acronyms i've never heard of

What You Need to Know About Application Security Testing

Application Security Testing Security testing refers to the software testing done to improve applications, software, or information systems’ safety by identifying continuous threats, possible flaws, and risks associated with the software applications. Ideally, this prevents threats from intruders and cyber attackers. Its principal function is to identify any hazards that can cause considerable damages to

What You Need to Know About Application Security Testing Read More »

beaver builder vs elementor

Flaw in Elementor and Beaver Addons Provide Admin Access to Hackers

Critical vulnerabilities have been found in popular WordPress plugins, “Ultimate Addons for Elementor” and “Ultimate Addons for Beaver Builder”. Developed by Brainstorm Force team, the Ultimate Addons plugins allow WordPress site owners to use additional widgets/functionality to popular page builders such as Elementor and Beaver Builder. UABB is a core piece of kit in our

Flaw in Elementor and Beaver Addons Provide Admin Access to Hackers Read More »

zombieland image

Zombieload! Patch yourself!

What is Zombieload? You’ve probably heard of Meltdown, Spectre, and Foreshadow. Well, this is another exploit found with the modern Intel CPUs. The ZombieLoad attack allows stealing sensitive data and keys while the computer accesses them. Declared CVE-2018-12130. While programs normally only see their own data, a malicious program can exploit the fill buffers to

Zombieload! Patch yourself! Read More »

Scroll to Top