Data Leakage

Code Injection Vulnerabilities

Introduction to Code Injection Vulnerabilities Code injection is an attack where the attacker tries to inject a code that can…

2 years ago

Dark Web Ads Offering Access to Corporate Networks

The rate of cybercrime increased in the first half of 2020 due to the pandemic. The total volume of cyber…

2 years ago

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

3 years ago

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered…

4 years ago

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

5 years ago

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

5 years ago

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…

5 years ago

Security Advisory – Ransomware Attack Targeting China – December 2018

Ransomware Attack Targeting China - Security Advisory  1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…

5 years ago

Security Advisory – Tecnimont Cyber Theft

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

5 years ago