Vulnerability
Oracle Patches 32 Critical Flaws in MySQL, WebLogic Server, & VirtualBox VM
Oracle has released a list of security patches for more than 130+ products. These products were used in several industries, including banking, communication, enterprise,...
Cyber Attack
What is Vulnerability Assessment In Cybersecurity? – A Comprehensive Guide
One of the best methods for finding potential security gaps in your company's cybersecurity design is a vulnerability assessment.You risk losing sensitive information...
Vulnerability Analysis
Perform Vulnerability Scanning in Your Network using Maltego
Maltego is an intelligence-gathering tool, that is available for Windows, Mac, and Linux. We will be using Kali Linux where it's known by default....
Vulnerability Analysis
How to Perform Manual SQL Injection With Double Quotes Error-Based String Method
If you are trying to hack the databases with methods like single quotes error-based Manual SQL Injection, Integer based injection but the databases are not...
Vulnerability
Lynis – Open Source Security Auditing & Pentesting Tool – 2023
Lynis is an open-source security auditing tool. Its main goal is to audit and harden Unix and Linux-based systems.
It scans the system by performing...
Vulnerability Analysis
SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation
Sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over database servers.It comes...
Vulnerability Analysis
BrutePrint – Bruteforce Attack to Bypass User Authentication on Smartphones
A novel assault named 'BrutePrint' has been unveiled by the joint efforts of Tencent Labs and Zhejiang University researchers, enabling the forceful extraction of...
Cyber Security News
CISA Warns that Hackers Actively Exploiting Samsung Vulnerability
CISA has issued a recent warning regarding a security flaw that impacts Samsung devices, enabling attackers to circumvent Android's address space layout randomization (ASLR)...