A look into Drupalgeddon’s client-side attacks
Drupal is one of the most popular Content Management Systems (CMS), along with WordPress and Joomla. In late March 2018, Drupal was affected by a major remote code execution vulnerabilityRead More →
Drupal is one of the most popular Content Management Systems (CMS), along with WordPress and Joomla. In late March 2018, Drupal was affected by a major remote code execution vulnerabilityRead More →
Kali Linux is the most popular penetration testing and hacking Linux distroibution and Ubuntu is the most popular Linux distribution. Since it is kind of common knowledge that Linux is a more convenientRead More →
SQL (Structured Query Language) is a popular programming language for managing data kept in relational databases. However, the databases can be breached when an attacker adds SQL statements that attemptRead More →
Each security analysis of a web application must include the steps recommended by computer security experts. The vulnerability analysis tools developed by the International Institute of Cyber Security follow theRead More →
In May, security experts found vulnerability in the LocationSmart website that allowed, without authentication, to obtain the real-time location of cell phones in the United States. The vulnerability has beenRead More →
Google launched a free DDoS protection platform named Project Shield, to protect news sites and freedom of expression, with the aim of defending democratic processes. According to information security researchers, this newRead More →
The professionals explain that DNSBin is a tool used to test the filtering of data through DNS and helps to test vulnerabilities such as RCE or XXE when the environmentRead More →
A former CIA engineer is being accused of handing the documents from the Vault 7 series to WikiLeaks. The US government claims to have identified the malicious actor who allegedlyRead More →
A joint work of Chinese and American information security professionals found a new method to attack smart personal assistants like Amazon Alexa and Google Home, whom they called “squatting voice”.Read More →
The login details of a company that buys phone location data from major telecom companies have been provided and then sold to the police. According to information security experts, a hacker brokeRead More →