Find hidden directories on web server
What is DIRBUSTER? Dirbuster/ Directory Traversal Attacks where attacker can use dictionary of word list to find hidden or not hidden directories and files on the target web application &Read More →
Working as a cyber security solutions architect, Alisa focuses on application and network security. Before joining us she held a cyber security researcher positions within a variety of cyber security start-ups. She also experience in different industry domains like finance, healthcare and consumer products.
What is DIRBUSTER? Dirbuster/ Directory Traversal Attacks where attacker can use dictionary of word list to find hidden or not hidden directories and files on the target web application &Read More →
People ignore where or how authorities install surveillance cameras The Drug Enforcement Administration (DEA) and the Immigration and Customs Enforcement Service (ICE) have installed an undisclosed number of covert surveillance cameras onRead More →
The airline admitted that it was under attack for three months and took six months to disclose the data theft In late October, Cathay Pacific, Hong Kong’s official airline, announced thatRead More →
The traffic was hijacked through Russia, China and Nigeria A BGP leak caused the lack of availability of Google service on Monday; the traffic was redirected through Russia, China andRead More →
Some considerations on controller and processor responsibilities and other concepts present in the European data protection law, such as DPIA and DPO The application of the European Union’s General Data ProtectionRead More →
URLCRAZY:- Url crazy is used to test domain names and its variations on internet. Url crazy, let you see if someone has registered a domain that closely associated to yourRead More →
DNSRECON Dnsrecon is used in checking of NS records and all the common DNS record types like MX,SOA,NS,A,TXT. This tool was originally written by Carlos Perez in 2006 and writtenRead More →
Use You should use this with docker. According to digital forensics specialists from the International Institute of Cyber Security, all you have to do is send this command: $ mkdirRead More →
The person who reported the bug was rewarded with $20k USD A cybersecurity researcher discovered and reported a bug on Steam that allowed people to download any game available on the digitalRead More →
A Russian exploit developer publicly revealed the security flaw An expert in cybersecurity and digital forensics and exploits developer from Russia has publicly disclosed a zero-day vulnerability in all versions of VirtualBoxRead More →
In the last 12 months, hackers compromised 60 million cards from the United States Chip and PIN technology has become the established standard for payment card transactions in the UnitedRead More →
Adopting the right approach to these types of threats The cryptocurrency mining has grown considerably in recent years. According to reports of cybersecurity and digital forensics specialists from the InternationalRead More →
The Lazarus hackers have been using the FastCash Trojan on obsolete AIX servers to steal tens of millions of dollars The researchers of the information security and digital forensics firmRead More →
Security investigators discovered a new botnet of spam; they calculate that the number of infected devices is close to half a million Researchers from a cybersecurity and digital forensics firmRead More →
According to an official of the Pakistani Federal Investigation Agency, almost all the banks of the country were affected by a recent security breach Almost all Pakistani banks were affectedRead More →
Security bugs could expose details about drone owners Researchers at a cybersecurity and digital forensics firm identified a couple vulnerabilities in the website and apps of the popular drone manufacturerRead More →
The organization has admitted that much of its information was leaked by an attacker still unknown The International Football Federation Association (FIFA), the governing body of football worldwide, admitted that,Read More →
A flaw in how WordPress handles privileges can be exploited to take control of a domain A flaw in the WordPress process to manage user privilege assignments can be exploited toRead More →
The US Army Cyber Brigade and the Digital Defense Service join forces in the launching of a new collaborative space Specialists in information security and digital forensics from the InternationalRead More →
User information was leaked through an unprotected MongoDB server The personal data of nearly 700k American Express customers in India have been accidentally exposed online via a MongoDB server without the necessaryRead More →