Your Perfect Cybersecurity Partner

Stay Connected:

Image
1.2 K
Views
23rd August 2022 1180

Why should we use a proxy server?

People don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).

Image
1.2 K
Views
10th August 2022 1233

What is the difference between Manual Penetration Testing versus Automated Penetration Testing?

The new normal has made the market bigger for digital transformation projects and strategies for moving to the cloud.

Image
1 K
Views
5th August 2022 1001

What are the benefits of Cloud Penetration testing?

It all depends on how you perceive it to be. Most business owners feel that cloud space equals cloud security. Now, before I reveal the answer let’s see the story below; Accenture is no doubt the biggest name in software.

Image
1.4 K
Views
2nd August 2022 1398

Word-press plugin lightspeed caches security flaws and how to exploit them

WordPress plugin LiteSpeed Cache has a cross-site scripting vulnerability because it does not properly sanitize user input. An attacker can take advantage.

Image
1.5 K
Views
29th July 2022 1475

XML Rpc Attack

Yes, I am talking about U.S department of defense get hacked. Bibek Dhakal found that the xmlrpc.php file on the U.S. Department of Defense website had been turned on leaving it open to an attack on other sites. The XML Rpc.php in WordPress is turned on by default

Image
1.5 K
Views
22nd July 2022 1457

What is the difference between VA and PT ?

Thief plots heist at home. It takes him some time to figure out how to get into the house without being noticed. What we're doing here is called Vulnerability assessment.The thief could have used a glass door .

Image
1.1 K
Views
15th July 2022 1090

What Is CRLF Injection Attack?

Twitter is one of the most popular social media platforms available today, with 100 million daily active users and 500 million tweets sent daily. But, do they have the best cybersecurity defense? Youssef discovered It was possible to inject the CRLF injection

7th July 2022 967

Why Cloud Forensics Fail?

Digital Forensics is the field of forensic science that is concerned with retrieving, storing and analyzing electronic data that can be useful in criminal investigations. This includes information from computers, hard drives, mobile phones

Image
1.3 K
Views
5th July 2022 1301

What Is FTP Penetration Testing and What It Is Not?

File transfer protocol, a standardized protocol used to allow transmission of files between computers. It consists of a set of coded signals which are transmitted between computers, and which inform

Image
1.1 K
Views
30th June 2022 1054

How to save yourself from Phishing attacks? A quick guide

Phishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It

28th June 2022 966

Do you postpone the windows patch update?

If you do postpone, you might want to read this one. Many employee’s in the organization are using the old unpatched server, because of the blue screen error, system restart & update time.

23rd June 2022 927

What is spring4shell vulnerability and how to address this vulnerability

Spring is a popular lightweight Java platform application framework that enables developers to easily create Java applications with enterprise-level features