Category: Vulnerability

Read our latest blog posts

Recordbreaker: The Resurgence of Raccoon

Researcher: Anandeshwar Unnikrishnan Editors: Suchita Katira & Hansika Saxena An info stealer is malicious software (malware) that...

Continue reading

How Threat Actors are Exploiting Android Webview

What is a WebView WebView is a simple but powerful way to present web-based content in Android....

Continue reading

Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability

The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...

Continue reading

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

A Guide to the Most Popular Zero-Day Attacks

Zero-days are software vulnerabilities that are not known to the developers. Here's a list of the most...

Continue reading

Contemporary Single-Page Applications and Frontend Security

This blog details the build process of Single-Page Applications, and explains how they alter the security implications...

Continue reading

Why programming skills are essential for penetration testers

Experienced security professionals say that entry-level positions in security and hacking doesn't require programming skills. Is this...

Continue reading

What makes web applications an easy target for hackers?

Verizon Data Breach Investigation Report finds that web applications are the single most significant cause for data...

Continue reading

Why monitoring the most popular P2P messenger should be a cybersecurity...

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly...

Continue reading

What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that...

Continue reading