Information Security (Page 69)

From next September, the Chinese authorities will require that any citizen who finds a zero-day vulnerability report it to the government, so they will not be able to send itRead More →

Penetration testing is one of the most important stages of any security analysis, so researchers should always have the best tools in this process. On this occasion, cybersecurity experts fromRead More →

Cybersecurity specialists reported the discovery of at least 15 flaws in Centreon, an open source solution for monitoring applications, systems and networks based on Nagios concepts. According to the report,Read More →

This week, Interpol released a report on the results of Operation Pangea, which led to the shutdown of a never seen before number of fraudulent websites posing as pharmaceutical companies.Read More →