Weibo mandates users to complete real-name verification by September 15. This move aligns with broader online regulation efforts by the Cyberspace Administratio
Discover the story of Jeff Moss, a renowned cybersecurity expert and hacker who founded the famous Black Hat conference. Learn about his early hacking days and
Scanners Box is a comprehensive repository of open-source scan tools for cybersecurity professionals. It includes subdomain enumeration, database vulnerability
Explore the top 17 penetration testing tools used by security experts. Discover Nmap for network discovery, Aircrack-ng for wireless network assessment, and mor
Learn about the new threat of malware being secretly installed in trusted software through supply chain attacks. Discover how these sophisticated cyberattacks b
A recent security breach involved the popular PC cleaning tool CCleaner. Hackers infected versions released between mid-August and early September with malware,
Learn about the case of an e-commerce company in China whose computer system was illegally accessed by a hacker, resulting in significant financial losses and o
A 28-year-old software employee exploited her position as a system maintainer to steal 20 million property records, which were sold illegally. Explore the detai
Discover the details of Russia's SORM surveillance technology revealed by WikiLeaks. Explore the history and components of this monitoring infrastructure used b