Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters …
Morgan Stanley considers Bitcoin to be of no value
Cryptocurrencies dominated the financial news space in 2017, with bitcoin rising more 13 times this year, as per Coindesk, even …
Hackers can Recover Smart Phone PIN by combining Data Available in Sensors
Security PIN plays a vital role in protecting sensitive application such as banking applications, Wallets, and unlocking screen. It remains …
Web Trackers Exploit Browser Password Managers and Steal Login Information From Browser
A known browser vulnerability exploits the default browser Password manager that abused by third-party scripts and exfiltrate the hidden user …
Three more Malicious Backdoored plugins with More than 89,000 Active Installs found in WordPress Repository
WordPress has such a massive ecosystem consist of a number of plugins and themes, threat actors involved in various malicious …
What Is A Bug Bounty Program And Why Every Organization Needs One?
What Is A Bug Bounty Program? A Bug bounty program is also known as vulnerability rewards program (VRP) is the …
Acoustic Attack Against HDDs Can Cause Permanent Damage CCTV DVR, PCs, ATMs
Hard disks play a vital role in numerous computing systems including, personal computers, closed-circuit television (CCTV) systems, medical bedside monitors, …
Load Balancer-Reverse Proxy Reconnaissance On Target Domain
Reconnaissance work on target domain to find out target domain has load balancer so that penetration testing does not misdirect …
Top hoax stories of 2017
As we prepare to bid our adieu to 2017, let’s have a look back at the year’s trending news points …
USB Forensics – Reconstruction of Digital Evidence from USB Drive
Digitial Forensics analysis of USB forensics include preservation, collection, Validation,Identification, Analysis, Interpretation, Documentation, and Presentation of digital evidence derived from …