Russian Hackers running Cyberspying Campaign
Researchers at the FireEye, announced that they have detected the exploitation of zero-day Flash vulnerabilities and Microsoft Windows flaw in a Russian espionage campaign...
Watcher Web security testing tool & Vulnerability Scanner
Ever find yourself looking for that showstopper exploit in a Web-app, and forgetting to check out all the low-hanging fruit? That's intitially why we...
Iron Web application Advanced Security testing Platform
IronWASP (Iron Web application Advanced Security testing Platform) is an open source system for web application vulnerability testing. It is designed to be customizable...
Source Code Analyzer for PHP Vulnerabilities – RIPS
The World Wide Web grew rapidly during the last decades and is used by millions of people every day for online shopping, banking, networking, and...
Shellshock Vulnerability Scanning – Nessus
Nessus, the most popular vulnerability
scanner that scan the IT infrastructure to find the possible
vulnerabilities in the network. Nessus can also be integrated with
Nmap and...
Liffy – Local File Inclusion Exploitation Tool
Local File Inclusion (LFI) is similar to a Remote File Inclusion vulnerability except instead of including remote files, only local files i.e. files
on...
FakeNet Malware Analysis
FakeNet is a tool that aids in the dynamic analysis of malicious software. The tool simulates a network so that malware interacting with
a remote...
OpenVPN Desktop client affected by a critical CSRF flaw
Researchers at
SEC Consult have discovered a CSRF vulnerability in the OpenVPN Desktop
Client that can allow remote code execution.
Security researchers at SEC Consult...
Top 10 Vulnerability Scanner
P { margin-bottom: 0.08in; }
Vulnerability scanner is a software program that has been designed
to find vulnerabilities on computer system, network and servers. In
addition to...
PHP Vulnerability Hunter
P { margin-bottom: 0.08in; }A:link { }
PHP is one of the most
famous, open source scripting language that is specially designed for
web development. Most...
How to Exploit an Iframe Vulnerability & Security
Web application security is always an important topic to discuss
because websites seem to be the first target of malicious hackers.
Hackers use websites...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...