Cross-chain protocol Multichain bug gets exploited for $1.34 million

Quick Take A bug in cross-chain protocol Multichain has been exploited for $1.34 million, according to researchers. While the bug

Read more

A Brief History of the Cybersecurity Profession

Cybersecurity careers are in high demand, but a closer look at the timeline of network technology and the Internet reveals

Read more

Cyber Threat Hunting

Welcome to CyberHunting.com web page, a community of security researchers. Providing information related to cyber threat hunting, penetration testing, bug

Read more

Use of blockchain technology could increase human trust in AI

AI is a new generation technology where machines and information systems demonstrate a form of intelligence that simulates the natural

Read more

We Can Neither Regulate Nor Sanction Away Cryptocurrency’s Facilitation of Ransomware

Interesting article from ISACA. If you are interested to learn what happen to the Colonial pipeline ransomware attack. This is

Read more

Tricky New TSA PreCheck Scam Steals Your Personal and Credit Card Details

Doing one of the best jobs impersonating a website ever seen, this new scam attempts to take those renewing or

Read more

ICE HSI investigation results in prison sentence and restitution for international hacking group members who stole millions in cryptocurrency

DETROIT – A sixth member of an international hacking group known to its members as “The Community” was sentenced yesterday

Read more

Hackers grab Social Security numbers from California Pizza Kitchen

California Pizza Kitchen (CPK) has revealed a data breach that exposed the Social Security numbers of more than 100,000 current

Read more

How We Broke the Cloud With Two Lines of Code: The Full Story of Chaosdb

Wiz Research Team disclosed technical details about the discovery of the ChaosDB vulnerability in Azure Cosmos DB database solution. In

Read more

Most execs say they don’t know who to call when security issues come up

Most high-level executives are highly confident in the cybersecurity of their supply chain, despite lacking comprehensive understanding of the essential

Read more