Cyber attackers establish a network by infecting computers with malware. This remotely controlled malware is called a “bot“. The network...
Read more1 Executive Summary 1.1 Overview LockBit 2.0 is a Ransomware as a Service (RaaS), with an Affiliate program in place....
Read moreHTML Injection vulnerability is a kind of injection vulnerability as you can understand from it’s name. It allows the user...
Read moreSummary of Analysis The NOBELIUM group is also known as APT29. NOBELIUM has generally targeted government institutions, non-governmental organizations, think...
Read moreIn this article, Apache Server and its vulnerabilities, and ways to mitigate these threats will be talked about. How to...
Read moreLet’s start with what jquery and XSS are. Jquery is a library of JavaScript. It was created to facilitate the...
Read moreFile upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things...
Read moreSensitive data must be protected when transmitted over the network. This data may include user credentials and credit card information....
Read moreIn this article, what is Server Header Information Disclosure and what ways it causes will be discussed. While the web...
Read moreSSL Certificate An SSL certificate is a digital certificate that authenticates a website and encrypts information sent to a server...
Read more