Microsoft urgently releases Out-of-Band patch for an active Internet Explorer remote code execution zero-day...
Yesterday, Microsoft released an out-of-band patch for a vulnerability discovered in the Internet Explorer that attackers are actively exploiting on the Internet. The IE...
Sennheiser opens up about its major blunder that let hackers easily carry out man-in-the-middle...
Yesterday, Sennheiser, an audio device maker issued a fix for a major software blunder that let hackers easily carry out man-in-the-middle attacks by cryptographically...
Baidu Security Lab’s MesaLink, a cryptographic memory safe library alternative to OpenSSL
X-Lab, Baidu’s security lab focused on researching and developing industry-leading security solutions, today released the latest version of MesaLink, a cryptographic memory safe library...
Tink 1.2.0: Google’s new multi-language, cross platform, cryptographic library to secure data
Google announced yesterday the release of a new version of its multi-language, cross-platform cryptographic library, named, Tink 1.2.0 to secure data. Earlier versions of...
Say hello to Sequoia: a new Rust based OpenPGP library to secure your apps
GnuPG developers have recently begun working on Sequoia, a new OpenPGP implementation in Rust. OpenPGP is an open, free version of the Pretty Good...
NetSpectre attack exploits data from CPU memory
After the recent SpectreRSB attack on Intel, AMD, and ARM CPUs, a group of security researchers have found a new Spectre variant in town...
Oracle makes its Blockchain cloud service generally available
After the first preview of its Blockchain Cloud Service at OpenWorld last October, Oracle has confirmed the general release and availability of its Blockchain...
Protect your TCP tunnel by implementing AES encryption with Python [Tutorial]
TCP (Transfer Communication Protocol) is used to streamline important communications. TCP works with the Internet Protocol (IP), which defines how computers send packets of data...



![Listen: UX designer Will Grant explains why good design probably can’t save the world [Podcast] Will Grant on UX in 2019](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-1056306412-218x150.jpg)

![Qt installation on different platforms [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/05/iStock-517668754-218x150.jpg)
![Debugging and Profiling Python Scripts [Tutorial] Python code pytorch](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/03/Python-Code-Image-218x150.jpg)
![How to remotely monitor hosts over Telnet and SSH [Tutorial] Server](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/08/Server-218x150.jpg)
![Application server clustering using various cloud providers [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/03/Nodejs_Cover-Image-218x150.png)
![Applying Modern CSS to Create React App Projects [Tutorial] Network Monitoring of Internet Traffic Data as Art. Routing protocol](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/12/iStock-913689714-218x150.jpg)












![Protect your TCP tunnel by implementing AES encryption with Python [Tutorial]](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/06/tunnel-218x150.jpg)



![Listen: UX designer Will Grant explains why good design probably can’t save the world [Podcast] Will Grant on UX in 2019](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-1056306412-324x400.jpg)
![Honeycomb CEO Charity Majors discusses observability and dealing with “the coming armageddon of complexity” [Interview] Charity Majors interview](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2019/03/iStock-539648180-324x400.jpg)


![Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview] Packt and Humble Bundle come together for cybersecurity bundle](https://proxy-ga.blitzz.co/proxy/123456/web.archive.org/web/20190322211136im_/https:/hub.packtpub.com/wp-content/uploads/2018/11/iStock-961628368-324x400.jpg)





