kalpadmin

Introduction to Internet of Things (IoT)

Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…

7 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

7 years ago

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…

7 years ago

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…

7 years ago

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the…

8 years ago

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

8 years ago

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

8 years ago

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware -…

8 years ago

Buffer Overflow Attacks

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…

8 years ago