News

Latest News

email-phishing-attacks

Weapons of mass delusion: 10 simple recipes for successful social engineering

What is social engineering? Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social...
GDPR Penetration Testing

Penetration Testing for GDPR

What is GDPR? The General Data Protection Regulation (GDPR) is focused on the personal data of citizens within the European Union. GDPR is often viewed as having two...
tpm-fail-vulnerability

TPM-FAIL Vulnerabilities Threaten PCs, Laptops, Servers, and Other Devices

A joint group of researchers from the Worcester Polytechnic Institute (USA), the University of Lubeck (Germany) and the University of California at San Diego (USA) revealed details of two problems, collectively called...
upwork-scam

Someone asked to share UpWork account

Over the past couple of years, there have been more frequent cases with requests to provide access to the account on UpWork for money. Usually people ask to provide such access as...
osint-recon

Useful tools for OSINT

What is OSINT? Open Source Intelligence, or "OSINT," was defined by the Department of Defense (DoD) as “produced from publicly available information that is collected, exploited, and disseminated...
iot-security

2019’s Most Common IoT Security Threats to Consider

Being used in hitherto unheard of sectors, IoT is gaining momentum day in day out! Due to which more and more companies are jumping on the IoT bandwagon with various point solutions and capabilities.
Effective Network Scanning Tools

Effective Network Scanning Tools

What is network security First of all, let's try to understand what is network security and on the next step we going to list and discuss security tools...
Penetration testing tricks

Black Box Penetration Testing Tips & Tricks

Let's quickly walk through some interesting and useful tricks for penetration testing with black box modal approach. This article oriented mostly for external type of pentesting where you have steps of active...
Vega - Web Application Security Scanner

Vega

Vega is a free and open source web security scanner and web security testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site...
Building recon tool

Automated recon tool with PHP, cURL, wafw00f, WhatWeb, Whois

Recon (Reconnaissance) - The act of gathering important information on a target system. This information can be used to better attack the target. For example, open source search engines can be used...

Bug Bounty