Hotspot Honeypot

| | Hacking
Introduction The Hotspot Honeypot is an illegitimate Wi-Fi access point which can appear as an authorized and secure hotspot. Despite appearances, it is actually set up by black-hat attackers or... Go on to the site to read the full article ... Read More

Tabnabbing

| | Phishing
What is Tabnabbing? As described by Aza Raskin, tabnabbing goes like this: when a simple JavaScript detects that the user has moved to another browser tab or has been inactive for some time, a URL in... Go on to the site to read the full article ... Read More

Password Spraying

| | Hacking
As we are witnessing many organizations moving aggressively towards cloud-based platforms, we are also coming more into contact with Federation services. Federations extend the authentication process... Go on to the site to read the full article ... Read More
Pentester Academy Command Injection ISO: SugarCRM 6.3.1 Exploitation

Pentester Academy Command Injection ISO: SugarCRM 6.3.1 Exploitation

| | Hacking
Introduction The Pentester Academy by Vivek Ramachandran had compiled a virtual machine that consists of various vulnerable real-world application. All the application is vulnerable to Command... Go on to the site to read the full article ... Read More
QRL Jacking

QRL Jacking

| | Hacking
Quick Response Code Login Jacking (also known as QRL Jacking) is a social engineering attack by which the attacker can hijack the session, affecting all applications that depends on the “Login... Go on to the site to read the full article ... Read More
All about SamSam Ransomware

All about SamSam Ransomware

Ransomware: Perhaps Today’s No.1 Security Threat Threatening and Risky for you and fruitful for hackers, ransomware has taken over as today’s no. 1 security threat. Attacks related to... Go on to the site to read the full article ... Read More

Importance of IP Fragmentation in Penetration Testing

| | Penetration Testing
Introduction Penetration testing is an extremely important testing aspect when we consider the optimum level of security for any system pertaining to crucial importance. It can be defined as a... Go on to the site to read the full article ... Read More

5 Business Email Compromise Attack Examples We Can Learn From

| | Phishing
Business email compromise (BEC) is a type of phishing scheme where the cyber attacker impersonates a high-level executive (CIO, CEO, CFO, etc.) and attempts to get an employee or customer to... Go on to the site to read the full article ... Read More