You are here:
Home
Information Security
© (c) Cyberfreek Industries, llc 1997-2025 All rights reserved.
Main Menu
Home
Blackhat - Las Vegas
DEFCON - Las vegas
Information Security
Cyber Security
Cyberfreek News
Phishing Expeditions
Consulting Services
Cheat Sheets
Log4j / Log4shell
Hacking Labs
Flipper Zero
Raspberry Pi
Cyberfreek on Twitter
The Hacker News
The Hacker News
Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server
Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extension
5 Ways Identity-based Attacks Are Breaching Retail
Why Cyber Freek?
Security Week Feed
Ivanti, Fortinet, Splunk Release Security Updates
Alleged Chinese State Hacker Wanted by US Arrested in Italy
Adobe Patches Critical Code Execution Bugs
Cyber Security Hub
Building cyber security resilience through governance & assurance
Breaking the vicious cycle between climate change & cybersecurity
Cloud security strategies that actually work for businesses
Viewing cyber security events in context
Navigating the rising tide of AI attacks
6 major cyber attacks & data breaches in March 2025
How cyber security experts are fighting AI-generated threats
Articles
Title
Author
100k Wireless Routers Susceptible
Written by: CyberFreek
Here Password, Hear Password...
Written by: CyberFreek
Vendor refusing to fix backdoor
Written by: CyberFreek
Elite Hacker done in by his iPhone
Written by: CyberFreek
Beyond Penetration Testing
Written by: CyberFreek
FBI sweeps for Anonymous Hackers
Written by: CyberFreek
Sophisticated Attack hits Pacific Northwest National Labs
Written by: CyberFreek
Network Defense using Air-Gap
Written by: CyberFreek
Dropbox woes continue with Passwords optional for a few hours
Written by: CyberFreek
NetSol hit with DDoS
Written by: CyberFreek
Page 6 of 8
1
2
3
4
5
6
7
8
Application Security
5
Articles that pertain specifically to Application Security
Breach and Disclosure
19
Network Security
4
Wireless Security
5
Celll Phones and Mobile devices
19
The Cloud
6