Blogs
Find the latest blog’ posts:
- by Owais SultanAI-generated code is changing AppSec workflows, forcing teams to rethink SDLC security, dependency checks, code review, and risk prioritization.
- by Deeba AhmedDataDome researchers uncovered a massive low and slow DDoS attack that delivered 2.45 billion requests using 1.2 million IP addresses.
- by CyberNewswireCambridge, MA, 5th May 2026, CyberNewswire
- by Deeba AhmedAn anti-ICE website, GTFO ICE, linked to Miles Taylor, is accused of exposing the personal details of 17,662 activists, sparking concerns that the data may have reached government agencies.
- by Deeba AhmedA massive fraud network called FEMITBOT uses Telegram Mini Apps and fake brand names like Apple, Disney, and…
- by WaqasResearchers revealed 20-year-old PostgreSQL flaws at Wiz ZeroDay.Cloud event, exposing critical bugs in pgcrypto and prompting urgent patches for database security.
- by Owais SultanSecure philanthropy needs hardened payments, API security, and compliance controls to protect global donations from fraud and attacks.
- by Owais SultanSecure Browsers boost safety with tracking blocks, fingerprint protection, session control, and real-time threat defense against modern web attacks.
- by Deeba AhmedVECT 2.0 ransomware contains fatal flaws that permanently destroy files, making recovery impossible and rendering ransom payments useless for victims worldwide.
- by Deeba AhmedScammers are abusing Google AppSheet and Google Drive to bypass security filters and steal thousands of Facebook Business accounts globally.
Guest Blogs
Post your insights, hacking experiences, and comments here:
