Cybercrime duo accused of picking $2.5M from Apple’s orchard

February 8, 2024 at 09:08AM Cybersecurity researcher and associate charged in California for allegedly defrauding a tech company (most likely Apple) of $2.5 million. They gained access to Apple’s systems via a third-party contractor, ordering gift cards and hardware and selling them to third parties. An unsealed court indictment points to the defendants’ involvement. The … Read more

Hacker Conversations: Rob Dyke on Legal Bullying of Good Faith Researchers

February 6, 2024 at 07:36AM Rob Dyke, currently director of platform engineering at Enable, discusses the ethical aspects of hacking and the impact of corporate legal bullying on good faith researchers. He emphasizes the importance of understanding how things work to improve them, rather than for personal gain. Dyke challenges stereotypes of hackers and highlights … Read more

Hacker Conversations: HD Moore and the Line Between Black and White

January 16, 2024 at 07:36AM The definition of a hacker is explored in an interview with HD Moore, who highlights the distinctions between moral, amoral, and immoral hacking based on intent and actions. He recounts his upbringing, early experiences of exploring technology, and the ethical dilemmas faced. The interview delves into the legal implications and … Read more

Update your white hat hacking skills with $70 off this training bundle

January 5, 2024 at 08:15AM The Ultimate 2020 White Hat Hacker Certification Bundle offers 10 courses taught by cybersecurity experts Nathan House and Joe Parys. The program covers various topics in ethical hacking, network security, Python for web applications, Nmap for network security checks, and certifications like CompTIA’s PenTest+ and Cybersecurity Analyst. Available for $39.99, … Read more

Three Ways To Supercharge Your Software Supply Chain Security

January 4, 2024 at 08:12AM The “Executive Order on Improving the Nation’s Cybersecurity” emphasizes securing the “Software Supply Chain.” The article provides three ways to enhance security: safeguarding secrets, using software composition analysis for transparency, and integrating ethical hacking. Strengthening Software Supply Chain Security is crucial for smooth software sales and overall resilience in the … Read more

Reimagining Network Pentesting With Automation

December 14, 2023 at 12:54PM Network penetration testing is vital in cybersecurity, yet misconceptions impact its role. This blog serves as a guide, explaining the process, debunking myths, and highlighting its significance. It encompasses internal and external testing differences, process stages, common misconceptions, and the comparison between manual and automated testing. It emphasizes the importance … Read more

Reimagining Network Pentesting With Automation

December 14, 2023 at 07:18AM Network penetration testing is critical for businesses in cybersecurity. This blog provides a quick guide, explaining the process, differences between internal and external tests, and how it works in seven stages. It debunks common myths and discusses manual vs. automated testing, emphasizing the effectiveness of vPenTest from Vonahi Security. Based … Read more

Kali Linux 2023.4 released with GNOME 45 and 15 new tools

December 5, 2023 at 02:19PM Kali Linux 2023.4, the last release of 2023, features GNOME 45 desktop, 15 new tools, and Kernel 6.3.7 upgrade. This distribution targets ethical hackers and includes updated apps, performance boosts, and new builds for cloud platforms and Raspberry Pi 5. Available for existing users via upgrade commands and for new … Read more

Q&A: Lessons Learned From the Middle East’s National Cyber Drills

December 5, 2023 at 01:55PM During a National Cyber Drill in Qatar, 170 organizations were tested by the National Cyber Security Agency. Ethical hacker Suleyman Ozarslan explained that entities, especially from critical infrastructures such as government and finance, participate in cyber drills, which involve responding to simulated cyberattacks. Participation is voluntary, with drills organized by … Read more