Cyber Attack
Hackers Use Fake Google Analytics Scripts To Steal Credit Card Details from Magneto-based Websites
Hackers inject malicious skimmer scripts that steal the credit card information from the checkout pages of Magento based online shopping sites.Security researchers from Sucuri...
Bug Bounty
Researcher Awarded $10,000 for Disclosing Critical XSS Vulnerability in Yahoo Mail
A Finland based security researcher named Jouko Pynnönen awarded $10,000 for disclosing critical cross-site scripting (XSS) vulnerability in the webmail version of Yahoo Email...
Exploit
Pwn2Own – Ethical Hackers Hacked Samsung Galaxy S9, iPhone X, Xiaomi Mi6 & Got Reward $325,000
Group of White hat hackers compromised Samsung Galaxy S9, iPhone X, Xiaomi Mi6 and earned $325,000 in Pwn2Own, two days Hacking completion in Tokyo...
Computer Security
Gartner Released Magic Quadrant for Web Application Firewalls – Imperva WAF Selected as a #1 Best WAF
Currently Web Application Firewall performing a major role in Web application protection since the web applications are primary targets for cybercriminals and the impact...
Top 10
OWASP TOP 10 – 2017 Released After Four years – Critical Web Application Security Risks
After four years Open Web Application Security Project(OWASP) released Top 10 Most Critical Web Application Security Risks and the last update was in 2013.Last...
Vulnerability Analysis
WordPress plugin Gaint BestWebSoft’s 53+ Plugin’s Vulnerable to Multiple Cross Site Scripting (XSS)
Recent Security Audits Reveal that , WordPress plugin's software Provider BestWebSoft's Many Plug's are vulnerable to Multiple Cross - Site Scripting (XSS) . This...
Web Applications
XSSight – Automated XSS Scanner And Payload Injector
XSS is a very commonly exploited vulnerability type which is very widely spread and easily detectable.What is XSS(Cross Site Scripting)?An attacker can inject untrusted snippets...
Web Applications
Most Important Vulnerability test methods for application security assessments
Many security Experts are thrust into the uncomfortable position of dealing with a huge portfolio of potentially insecure applications, limited resources and an overwhelming...