Security Vulnerability in Saflok’s RFID-Based Keycard Locks

It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...

A Taxonomy of Prompt Injection Attacks

Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt ...

Stopping Credential Stuffing Attacks: We Need to Do Better

Do you know what 23andMe, Jason's Deli, North Face, and Hot Topic have in common? They've all been breached by successful credential stuffing attacks in the last year!  An attack type that ...
Employee Spotlight – Stefan Dumitrascu

Employee Spotlight – Stefan Dumitrascu

We spoke to Chief Technology Officer, Stefan Dumitrascu For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu. How long have you been working at SE Labs? I’ve ...

Orange Spain Outage: BGP Traffic Hijacked by Threat Actor

In a recent cybersecurity incident, Orange Spain faced a significant internet outage on January 3, 2024. A threat actor, going by the name ‘Snow,’ exploited vulnerabilities in the company’s RIPE account. The ...

Ambulance service breach affects 900k, 401K phishing scam targets employee credentials

Data breaches are obviously damaging for victims, but organizations that experience such a cyberattack can also suffer great harm as well. Not only could those entities face massive fines, but they also ...
Best online .apk virus scanners

Best of 2023: Best online .apk virus scanners – Hackernet

| | antivirus, Cyber Security, Hacking
They are a lot of antivirus software and online scanners available to scan antivirus but only some of them work well. Here we listed the Best online .apk virus scanners that scan ...
bypass Multi-Factor Authentication

3 ways attackers bypass Multi-Factor Authentication

And 3 ways to stop them. Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by ...

Online Retail Hack

Selling miniature replicas to unsuspecting shoppers: Online marketplaces sell tiny pink cowboy hats. They also sell miniature pencil sharpeners, palm-size kitchen utensils, scaled-down books and camping chairs so small they evoke the ...