XSS Cheat Sheet

Top 500 Most Important XSS Script Cheat Sheet for Web Application Penetration Testing

XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable. Here we are going to see about most important XSS Cheat sheet. What is XSS(Cross Site Scripting)? An attacker can inject untrusted snippets of JavaScript...
Attack Simulation

Using Breach & Attack Simulation Technologies to test Organizations Security Posture on-demand

The best way for an organization to protect itself against cybercrooks is to think and act like one. There is a new technology called Breach & Attack Simulation (BAS) that can put you in their place. This Technology allows...
IoT Cyber Attacks

Globally Gas Stations are Extremely Vulnerable to Internet of Things (“IoT”) Cyber Attacks

2018 begins with the rise of the Internet of Things (" IoT ") which is based on the existence of an interconnection of all kinds of everyday objects, such as a printer, a SmartTv, a refrigerator, a smart blind,...
SSL/TLS Certificate Revocation is Broken

SSL/TLS Certificate Revocation is Broken Time for More Reliable Revocation Checking Mechanism

We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Security researcher Scott Helme discovered a way to break Certificate Revocation Checking Mechanism. The process of getting a certificate has become more and more simple...
TOP 10 Cyber Attacks

TOP 10 Cyber Attacks and Critical Vulnerabilities of 2017

The year 2017 experienced many sophisticated cyber attacks which have been made a huge impact on the organization as well as individuals. Here we have listed TOP 10 Cyber Attacks and critical Vulnerabilities that was playing the major role in...


Signup to get Hacking News & Tutorials to your Inbox

Most Popular