Get XSS bug bounty with XSSfinder
Introduction “Extended XSS Search” is based on initial ideas of XSSfinder. XSS is also called a Cross Site Scripting, it is a type of security vulnerability found in web application.Read More →
Introduction “Extended XSS Search” is based on initial ideas of XSSfinder. XSS is also called a Cross Site Scripting, it is a type of security vulnerability found in web application.Read More →
A security alert, issued by instructors in the US-CERT hacking course, has been revealed, related to a dangerous remote execution flaw that has been present for nearly 18 years inRead More →
Recently Gianluca Pacchiella, researcher and specialist of a cyber security course published a blog post referring to CVE-2020-9544, a zero-day vulnerability involving the D-Link router DSL-2640B. “I did a securityRead More →
A cloud computing security firm has revealed the discovery of a critical zero-day vulnerability in one of the enterprise products of tech firm Zoho; according to the report, this flawRead More →
Although hackers often achieve to commit their crimes without leaving a trace, there are cases when authorities manage to identify them with relative ease. After taking a hacking course, anRead More →
Participants and instructors of information security training launched a software tool designed to bypass deep packet inspection (DPI). SymTCP is an open source tool for detecting subtle discrepancies between twoRead More →
For a couple of years now, cybersecurity firms, manufacturers and mainly car owners with keyless opening and start system have reported multiple incidents of “relay attacks”, which consist of theRead More →
Introduction In this smart world everything is connected to the internet, we can find hidden details using a google search engine. Google is used for everything and using this sameRead More →
An ethical hacking team has conducted a deep research on the major virtual private network (VPN) tools available on Google Play Store, discovering the presence of multiple security vulnerabilities inRead More →
Security products and solutions must be constantly updated as they are not exempt from exposure to exploitable vulnerabilities. According to a report from information security experts, the developers of theRead More →