Introduction There is no one who we can trust in this digital age! Phishing has become a prevalent assault in the previous decade, with the attacker using a false login screen to acquire users’ credentials. A novel phishing technique called […]
Introduction There is no one who we can trust in this digital age! Phishing has become a prevalent assault in the previous decade, with the attacker using a false login screen to acquire users’ credentials. A novel phishing technique called […]
Detail overview of trending issue in cyberspace, Ransomware What is Ransomware? Ransomware is a kind of software or programming script which encrypts the user’s files and blocks the user from accessing their data. The new generation ransomware malware is built […]
During a web application penetration project, our team has exploited a simple bug that can turn into remote code execution to the main server. Recently our team escalated a straight forward template injection to a Remote Code Execution and compromised […]
Leverage Strobes, a risk-centered vulnerability management platform to ingest vulnerabilities from scanners & teams, do predictive patching and automate security using workflows.