General Data Protection Regulation (GDPR) and Web Application Security
GDPR in Short Any company either based in the EU or which deals with any data involving EU citizens or organizations are required to comply. Under the…
GDPR in Short Any company either based in the EU or which deals with any data involving EU citizens or organizations are required to comply. Under the…
A 16 years old high school student from Melbourne, Australia, managed to break into Apple servers and downloaded some 90GB of secure files, including…
In December-2016, attackers were exploiting misconfigured open-source MongoDB databases and holding them for ransom. Bitcoin chart The ransomware attacks…
WannaCry is the ransomware computer worm that targets computers running Microsoft Windows. Initially, the worm uses the EternalBlue exploit to enter a computer…
GitLab CI (Continuous Integration) service is to build and test the software whenever developer pushes code to repository. GitLab CD (Continuous Deployment / Delivery) …
Sh00t is a Testing Environment for Manual Security Testers. It acts as a task manager to let testers focus on performing security testing. The biggest advantage…
Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution Check Point researchers revealed a new attack vector which threatens millions of users worldwide – attack by subtitles…
A seven-year-old remote code execution vulnerability that is affecting Samba versions 3.5.0 and higher is making news this week. The vulnerability is billed as the WannaCry equivalent for *nix operating systems, and…
Research Team is working to make this place better and safer Once upon a time, an old man walked down a Spanish beach at dawn, he saw ahead of him what he thought to be…
What is Clickjacking Clickjacking is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while…