fbpx
Home Vulnerability

Vulnerability

Russian Hackers running Cyberspying Campaign

Researchers at the FireEye, announced that they have detected the exploitation of zero-day Flash vulnerabilities and Microsoft Windows flaw in a Russian espionage campaign...

Watcher Web security testing tool & Vulnerability Scanner

Ever find yourself looking for that showstopper exploit in a Web-app, and forgetting to check out all the low-hanging fruit? That's intitially why we...

Iron Web application Advanced Security testing Platform

IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable...

Source Code Analyzer for PHP Vulnerabilities – RIPS

The World Wide Web grew rapidly during the last decades and is used by millions of people every day for online shopping, banking, networking, and...

Shellshock Vulnerability Scanning – Nessus

Nessus, the most popular vulnerability scanner that scan the IT infrastructure to find the possible vulnerabilities in the network. Nessus can also be integrated with Nmap and...

Liffy – Local File Inclusion Exploitation Tool

Local File Inclusion (LFI) is similar to a Remote File Inclusion vulnerability except instead of including remote files, only local files i.e. files on...

FakeNet Malware Analysis

FakeNet is a tool that aids in the dynamic analysis of malicious software.  The tool simulates a network so that malware interacting with a remote...

OpenVPN Desktop client affected by a critical CSRF flaw

Researchers at SEC Consult have discovered a CSRF vulnerability in the OpenVPN Desktop Client that can allow remote code execution. Security researchers at SEC Consult...

Top 10 Vulnerability Scanner

P { margin-bottom: 0.08in; } Vulnerability scanner is a software program that has been designed to find vulnerabilities on computer system, network and servers. In addition to...

PHP Vulnerability Hunter

P { margin-bottom: 0.08in; }A:link { } PHP is one of the most famous, open source scripting language that is specially designed for web development. Most...

How to Exploit an Iframe Vulnerability & Security

Web application security is always an important topic to discuss because websites seem to be the first target of malicious hackers. Hackers use websites...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...