KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!




Zerodium Triples WordPress Remote Code Execution Exploit Payout Zerodium has announced today an increased interest in exploits for the WordPress content management system that achieve remote code execution. The exploit acquisition platform is now enticing exploit developers and sellers with a $300,000 payout, three times more than the regular price. Short-term bump The company announced
Watch: Monkey Uses Elon Musk’s Neuralink To Play Pong With Its Mind A new video released by Elon Musk’s Neuralink shows a monkey playing Pong using its mind and embedded brain-human interface. Neuralink is Musk’s brain-machine interface (BMI) company that allows electrodes placed in parts of the brain to interface with machines, computers, and even
Researchers Earn $1,2 million For Exploits Demoed At Pwn2Own 2021 Pwn2Own 2021 ended with contestants earning a record $1,210,000 for exploits and exploits chains demoed over the course of three days. During this year’s hacking competition, 23 teams and researchers and security researchers targeted multiple products in the web browsers, virtualization, servers, local escalation of privilege,
CISA Releases Tool To Review Microsoft 365 Post-Compromise Activity The Cybersecurity and Infrastructure Security Agency (CISA) has released a companion Splunk-based dashboard that helps review post-compromise activity in Microsoft Azure Active Directory (AD), Office 365 (O365), and Microsoft 365 (M365) environments. CISA’s new tool, dubbed Aviary, helps security teams visualize and analyze data outputs generated using Sparrow, an