Category: Vulnerability

Read our latest blog posts

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

A Guide to the Most Popular Zero-Day Attacks

Zero-days are software vulnerabilities that are not known to the developers. Here's a list of the most...

Continue reading

Contemporary Single-Page Applications and Frontend Security

This blog details the build process of Single-Page Applications, and explains how they alter the security implications...

Continue reading

Why programming skills are essential for penetration testers

Experienced security professionals say that entry-level positions in security and hacking doesn't require programming skills. Is this...

Continue reading

What makes web applications an easy target for hackers?

Verizon Data Breach Investigation Report finds that web applications are the single most significant cause for data...

Continue reading

Why monitoring the most popular P2P messenger should be a cybersecurity...

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly...

Continue reading

What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that...

Continue reading

Quickstart Shodan: What is it and how does it work

Security professionals, government agencies trust Shodan to alert them on unmanaged IoT devices. Learn more about Shodan...

Continue reading

GraphQL 101: Here’s everything you need to know about GraphQL (Part...

Although GraphQL is one of the most efficient alternatives to REST API, it is vulnerable to attacks....

Continue reading

Pen-testing IoT Devices for Vulnerabilities

Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in...

Continue reading