Zombies’ New Favorite Victim – Your Website
Warning! Believe it or not, your business may be vulnerable to a zombie siege! These aren’t the shambling movie monsters of a George Romero...
Cyber Security Issues: How to Establish Your Own Secure Online Business
Cyber Security and Online Business
In a modern world where the biggest part of society has a constant, uninterrupted access to a global network, the...
OWTF: OWASP Offensive Web Testing Framework
OWTF is OWASP’s (Open Web Application Security Project) Offensive Web Testing Framework. This tool automates the manual and un-creative part of pen-testing. OWASP’s project...
Top 10 Web Application Vulnerability Scanners
A web vulnerability scanner is a program which works on a web application in order to discover potential security vulnerabilities and architectural flaws. It...
Burp Suite for Web Vulnerability Assessment, Free Training
Burp suite, a well known platform for performing security testing for web, there are many advantages of burp suite over the traditional web vulnerability...
DAws: The Advanced Web Shell
There's multiple things that makes DAws better than every Web Shell out there:
Bypasses Security Systems(IPS, WAFs,etc) like Suhosin(uses up to 20 php functions just...
Top 10 Web Application Vulnerabilities
The process of exploiting vulnerabilities in web applications has become very easy, especially for seasoned malicious hacker. When a hacker successfully identifies a security...
Why Automation is important in Web Application Security Assessment?
The importance of vulnerability assessment is the unearth fact and nobody can’t deny it. The technology has revolved in the recent years, the world...
Critical ‘Joomla’ bugs leaves 2.8million websites extremely vulnerable
A critical SQL-injection vulnerability in Joomla most widely used content management system; leaves around 2.8 million websites vulnerable to hackers. The bug allow a...
Xtreme Vulnerable Web Application (XVWA) – Practice Hacking Attacks
XVWA is a badly coded web application written in PHP/MySQL that helps
security enthusiasts to learn application security. It’s not advisable
to host...
Brolux : A Chinese Trojan Targeting Online Banking Users
ESET researchers on Thursday found a new Trojan, "Brolux" which is targeting Japanese internet banking users by exploiting vulnerabilities in Flash Player and Internet...
Shadow Daemon: Web Application Firewall
Shadow Daemon is a collection of tools to detect, protocol and prevent attacks on web applications.
Technically speaking, Shadow Daemon is a web application firewall
...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...