Application: Download
Exploit: Exploit-DB
Continue readingThe internet-enabled people to receive information in real-time. The interconnection of systems allowed algorithms to be remotely controlled and to make autonomous decisions. Information warfare (IW) is characterized by the search for destabilization, exploitation, corruption and destruction of information systems controlled by the adversary.
Continue readingI love coffee, so I did a security awareness poster connecting the Coffee time and Security tips!
Continue readingWith the expansion and diversification of cybercrime, strategies have become an obstacle to understanding and categorizing crime agents.
Continue readingProfessionals and managers seek daily to identify these elements and take preventive or corrective actions to avoid damage caused by these events.
Continue readingCross-Site Scripting (XSS) vulnerability on WSO2 API Manager Product. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s password and invalidate the session of the victim whilethe hacker maintains access. DETAILS:
Continue readingWith the growth of the number of people connected to the internet, cybercrime has become a severe problem globally.
Continue readingA very short review of the viruses that disrupted the cyberworld since 1970.
Continue reading