You are here:
Home
Information Security
© (c) Cyberfreek Industries, llc 1997-2025 All rights reserved.
Main Menu
Home
Blackhat - Las Vegas
DEFCON - Las vegas
Information Security
Cyber Security
Cyberfreek News
Phishing Expeditions
Consulting Services
Cheat Sheets
Log4j / Log4shell
Hacking Labs
Flipper Zero
Raspberry Pi
Cyberfreek on Twitter
The Hacker News
The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
The Hidden Weaknesses in AI SOC Tools that No One Talks About
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Why Cyber Freek?
Security Week Feed
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins
Cisco Warns of Hardcoded Credentials in Enterprise Software
North Korean Hackers Use Fake Zoom Updates to Install macOS Malware
Cyber Security Hub
Building cyber security resilience through governance & assurance
Breaking the vicious cycle between climate change & cybersecurity
Cloud security strategies that actually work for businesses
Viewing cyber security events in context
Navigating the rising tide of AI attacks
6 major cyber attacks & data breaches in March 2025
How cyber security experts are fighting AI-generated threats
Articles
Title
Author
2 Publically available VPNs compromised
Written by: CyberFreek
RDP Brute Force attacks are on the rise again.
Written by: CyberFreek
WebKinz Children is found on the Dark Web with 23 Million usernames and passwords exposed
Written by: CyberFreek
Part 2 of 2 - Tips for Staffing Agencies, Recruiters and Job Seekers.
Written by: CyberFreek
Part 1 of 2 - Tips for Staffing Agencies, Recruiters and Job Seekers.
Written by: CyberFreek
Work From Home during Covid-19 or Chinese Coronavirus time.
Written by: CyberFreek
RFID in Player Cards Hacked ?
Written by: CyberFreek
Facebook - Should be called Redfacebook or another 419Million Users Exposed
Written by: CyberFreek
Artificial Intelligence used to Hack ?
Written by: CyberFreek
BSidesLV, Blackhat and DEFCON 2018 gearing to go
Written by: CyberFreek
Page 2 of 8
1
2
3
4
5
6
7
8
Application Security
5
Articles that pertain specifically to Application Security
Breach and Disclosure
19
Network Security
4
Wireless Security
5
Celll Phones and Mobile devices
19
The Cloud
6