Wednesday, September 19, 2018

Detectify’s Frans Rosén #2 on HackRead’s 10 Famous Bug Bounty Hunters of All Time

Detectify’s knowledge advisor Frans Rosén has worked with security research for many years, and is a top ranked participant of bug bounty programs, receiving the highest bounty payout ever on...

iPhone Robbers Try Unique Phishing Scam to Unlock Physical Device

Just when you thought you’ve seen every avenue for a cyber attack, the thieves have done it again, but this time physical thieves, not the ones poking around your packets....

Anti Hate Content- Spotify Announced A New Policy

On Thursday 12th May Spotify Announced a New Policy representing hate content and hateful conduct. The carrier known as Anti Hate Content...

Critical Flaw in Telegram Allows Hackers to Spread Cryptojacking Malware

Posted on February 14, 2018 at 4:35 PM Russian cybercrime gangs have been exploiting a zero-day flaw in the popular messaging app, Telegram, to spread cryptojacking malware ever since March 2017 according...

Email Header Analysis – Received Email is Genuine or Spoofed

Email is a business critical asset.Altering email header to make the message appear to come from somewhere other than the actual source is a fraudulent email. If the spam filter is...

A secure open source OS for IoT

Canonical's Ubuntu Core, a tiny, transactional version of the Ubuntu Linux OS for IoT devices, runs highly secure Linux application packages, known as "snaps," that can be upgraded remotely. Using...

Microsoft Office – NTLM Hashes via Frameset

Microsoft office documents are playing a vital role towards red team assessments as usually they are used to gain some initial foothold on the client’s internal network. Staying under the...

OWASP TOP 10: Insecure Direct Object Reference

Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. OWASP is a non-profit organization with the goal of improving the security of software and the internet. We...

The Rise Of Open-Source Malware And IoT Security

While Mirai and other IoT botnets can’t be completely stopped, one way to weaken their power is to put added security layers in place at the network level . Source...

LATEST NEWS

MUST READ