EXCLUSIVE. Four years after being acquired by Sony, Israeli-manufacturer of high performance chipsets, Altair Semiconductor, is becoming Sony Semiconductor Israel, Ltd. “We have been honored to be part of... Read More
Ax Sharma
Ax Sharma is a Security Researcher, Engineer, and Tech Columnist. His works and expert analyses have frequently been featured by leading media outlets like Fortune, BleepingComputer, The Register, TechRepublic, CIO, etc.
Ax's expertise lies in vulnerability research, reverse engineering, software development, and web app security. He's an active community member of the OWASP Foundation and the British Association of Journalists (BAJ).
News tips welcome via Twitter DM (@Ax_Sharma) or email (ax@hey.ax).
The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while... Read More
The $9.99 Transpact escrow fee could end up being 10x more, if you use a money transfer service, like TransferWise. When buying and selling domains... Read More
Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or simply because of users employing... Read More
PlayStation has disclosed a severe use-after-free vulnerability, after over three months since it was reported. The vulnerability discovered by researcher Andy Nguyen exists in PS4... Read More
Open systems, open data, and open-source software provide a means to promote greater transparency, public trust, and user participation. But what happens when adversaries can... Read More
It is not unusual for malware to use malicious C&C servers and domains. However, what we learn this week is something entirely different, sinister and... Read More
In an email sent out today to Curve card customers, it is stated that the card would no longer be working. Curve is an all-in-one... Read More
What happens when the very antivirus designed to keep you and your organization safe becomes a threat vector for the attackers to exploit? Yesterday, I... Read More
A group that goes by the name Distributed Denial of Secrets (DDoSecrets) has published 269 GB worth of data with hundreds of documents, images and... Read More