MS Office’s 17 Year old Vulnerability Letting Hackers to Install Malware
At the point when the world is as yet managing the risk of 'unpatched' Microsoft Office's worked in DDE include, analysts have revealed a...
Presenting Vulnerability Report to Management
The organization's network is a never-ending source of vulnerability information. Whereas, the new systems and applications are constantly being added, making the job of...
APT2: Automated Penetration Toolkit
Automated Penetration Toolkit can perform an NMap scan and import the scan results from Nexpose, Nessus and other scanning tools. The results are further...
Commix: Command Injection Exploiter
Commix a short form for Command Injection Exploiter is an environment that web developers, penetration testers and even security researchers can use to test...
Exploring Vulnerabilities in HDMI
The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece of modern home theater equipment has HDMI support and...
Top 10 Web Application Vulnerability Scanners
A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...
Burp Suite for Web Vulnerability Assessment, Free Training
Burp suite, a well known platform for performing security testing for web, there are many advantages of burp suite over the traditional web vulnerability...
Brakeman Vulnerability Scanner for Ruby on Rails
Brakeman is an open source static analysis tool which checks Ruby on Rails applications for security vulnerabilities.
Unlike many web security scanners, Brakeman looks at...
VBScan Black Box vBulletin Vulnerability Scanner
Vulnerability scanning and assessment is the foremost method to find the
vulnerabilities and fix them to avoid any mishaps. There are many tools available...
Plecost: WordPress Vulnerabilities Finder
There are a huge number of Wordpress around the world. Most of them
are exposed to be attacked and be converted into a virus,...
Vulnerabilities found to Attack WordPress Websites
Two new threats have been found to the WordPress websites that allow attackers to take full control of the Web server. Attack code has...
iOS 8 vulnerability crashes iPhones and iPads when connected to WiFi
Security researchers have revealed a vulnerability in iOS 8 that leaves iPhones and iPads open to denial of service (DoS) attacks simply by connecting...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...