Recon Simplified with Spyse
Recon Simplified with Spyse by Arif Khan One of the major struggles in bug bounty hunting is to collect and …
Read MoreThinking Outside the Box – Data Breaches
Thinking outside the box – Data Breaches by Eva Prokofiev The article originally published at: https://www.tracelabs.org/blog/thinking-outside-the-box-data-breaches Disclaimer: This post was …
Read MoreHow to Find the Top Cybersecurity Companies in Your Area
How to Find the Top Cybersecurity Companies in Your Area |sponsored post| As enterprises and organizations set foot in the …
Read MoreExploiting Remote File Inclusion with SMB
Exploiting Remote File Inclusion with SMB by Nairuz Abulhul Recently working on the Sniper machine on hack the box, I …
Read MoreInsecure Deserialization with JSON .NET
Insecure Deserialization with JSON .NET by Nairuz Abulhul Today, I will go over one of the OWASP’s top 10 vulnerabilities, …
Read MoreHow to Keep Yourself Protected While Playing Video Games Online
How to Keep Yourself Protected While Playing Video Games Online Video games have become more popular — and mainstream — than ever …
Read More7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021
7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021 by Dr. Alina Matyukhina Smart technology is expected to grow …
Read MoreOverall, I Believe Some of the Best Red Teamers Are Those Who Were Blue Teamers First (and vice versa)
"Overall, I Believe Some of the best Red Teamers are Those Who Were Blue Teamers First (and vice versa)" Interview …
Read MoreBudget Optimisation Through PurpleTeaming
Budget Optimisation Through PurpleTeaming by Eliza-May Austin The Problem Arguably the biggest barrier to cybersecurity is cost. Many companies, regardless …
Read MoreFrom SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass
From SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass by Daniel Santos For …
Read More