Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…
Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…
What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…
Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…
Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the…
As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…
Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…
The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…
Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…
Here we will discuss Threat Advisory Report on WannaCry Ransomware (Critical Severity). 1. Introduction On Friday, May 12, countless organizations…