Case Study – New way to Exploit Java Deserialization Vulnerability

7 years ago

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

Security Advisory- MEGA Chrome Extension Hijack

7 years ago

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

7 years ago

Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

8 years ago

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the…

What Makes Penetration Testing Impactful – Post Exploitation

8 years ago

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

Threat Advisory Report on Petya Ransomware (Critical Severity)

8 years ago

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

Beware Android Users – CLOAK AND DAGGER is here to exploit you

8 years ago

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…

Buffer Overflow Attacks

8 years ago

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…

How To Develop Secure Software – Action Plan To Make Secure

10 years ago

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…