Blog
A Bug From Twitter Allowed Firefox To Store Cached Files Shared Via Direct Messages
Twitter has recently disclosed a vulnerability that indirectly affected users’ privacy. As disclosed, this Twitter bug allowed a browser to store cached...
Ethical Hacking Training Course Online- Tips on Choosing The Right Course
Almost all of us have a general notion of which field we want to pursue our careers in. However, selecting the best course that can provide you with...
Helpful Guide for Certified Ethical Hacker Exam
Preparing for the CEH exam and need some helpful guidelines to do well? We’ve got you covered. In this blog, we will provide you with all the necessary...
VPNs Are Stopped by Unpatched iOS Vulnerability From Thorough Traffic Encryption
While Apple has built a credible stance regarding users’ privacy, a bug has recently made shown otherwise. As discovered, an unpatched vulnerability...
Hackers Use Fake “Corona Antivirus” Software to Distribute Malware Backdoor
Security experts have reported two such sites where this software could be found. It comes with bot management features including restarting and shutting...
Social Engineering Penetration Testing – Methods and Steps
If you’ve read our previous blog, you may be aware of what social engineering penetration testing is. But if you haven’t, we advise that you give a quick...
Slack Addresses Potential Account Takeover Bug
There was a big threat to shared private data, channels, and conversation leak from the Slack platform. Slack addressed a critical flaw within 24 hours...
A Complete Guide to Social Engineering Penetration Testing
While there are various methods to perform a penetration test, we are specifically going to talk about social engineering penetration testing in this...
All Intel CPUs That Released in Last 5 Years are Affected by Unpatchable Flaw
All Intel processors released in the past 5 years contain an unpatchable vulnerability that could allow hackers to compromise almost every...