Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or simply because of users employing... Read More
Ax Sharma
Ax Sharma is an Indian-origin British security researcher, journalist and TV subject matter expert with a focus on malware analysis and cybercrime investigations. His areas of interest include open source software security, threat intel analysis, and reverse engineering. Frequently featured by leading media outlets like the BBC, Channel 5, Fortune, WIRED, The Register, among others, Ax is an active community member of the OWASP Foundation and the British Association of Journalists (BAJ).
PlayStation has disclosed a severe use-after-free vulnerability, after over three months since it was reported. The vulnerability discovered by researcher Andy Nguyen exists in PS4... Read More
Open systems, open data, and open-source software provide a means to promote greater transparency, public trust, and user participation. But what happens when adversaries can... Read More
It is not unusual for malware to use malicious C&C servers and domains. However, what we learn this week is something entirely different, sinister and... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
What happens when the very antivirus designed to keep you and your organization safe becomes a threat vector for the attackers to exploit? Yesterday, I... Read More
Share this: