Exploiting Remote File Inclusion with SMB
Exploiting Remote File Inclusion with SMB by Nairuz Abulhul Recently working on the Sniper machine on hack the box, I …
Read MoreInsecure Deserialization with JSON .NET
Insecure Deserialization with JSON .NET by Nairuz Abulhul Today, I will go over one of the OWASP’s top 10 vulnerabilities, …
Read MoreHow to Keep Yourself Protected While Playing Video Games Online
How to Keep Yourself Protected While Playing Video Games Online Video games have become more popular — and mainstream — than ever …
Read More7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021
7 Cybersecurity Predictions for Smart Buildings and Infrastructure for 2021 by Dr. Alina Matyukhina Smart technology is expected to grow …
Read MoreOverall, I Believe Some of the Best Red Teamers Are Those Who Were Blue Teamers First (and vice versa)
"Overall, I Believe Some of the best Red Teamers are Those Who Were Blue Teamers First (and vice versa)" Interview …
Read MoreBudget Optimisation Through PurpleTeaming
Budget Optimisation Through PurpleTeaming by Eliza-May Austin The Problem Arguably the biggest barrier to cybersecurity is cost. Many companies, regardless …
Read MoreFrom SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass
From SVG and back, yet another mutation XSS via namespace confusion for DOMPurify < 2.2.2 bypass by Daniel Santos For …
Read MoreTop Cybersecurity Trends in 2020
Top Cybersecurity Trends in 2020 Cybersecurity in 2020 will greatly affect the global economy, businesses, governments, consumers, and the common …
Read MoreSecuring Endpoints in 2020: Proactive Security with XDR
Securing Endpoints in 2020: Proactive Security with XDR by Gilad David Maayan What is XDR? In the past, endpoints were …
Read MoreSmall Business Cyber Security Tips: Understanding the Basics
Small Business Cyber Security Tips: Understanding the Basics by Nouman Ali According to the HISCOX Cybersecurity Report, 2018, small businesses …
Read More