Browsing Category
Security
396 posts
How Do Attackers Identify Victims For DDoS Attacks?
Distributed denial of service (DDoS) attacks cause American businesses to lose $10 billion a year. This kind of…
December 4, 2020
Xerror – Automated Penetration Framework
Xerror is an automated penetration framework, which will helps security professionals and non professionals to automate their pentesting…
November 25, 2020
Teler – An Real-time HTTP Intrusion Detection
Teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal…
November 24, 2020
Twitter Fleets Bug – It Still Visible on Twitter After 24hrs
Twitter Bug: The Fleets Still Visible on Twitter after 24hrs, users reported. What is Twitter Fleets? Fleets are…
November 23, 2020
Kali Linux 2020.4 New Version Released – Added CrackMapExec, dnscat2, goDoH
Hackers friendly operating system Kali Linux has released its new version 2020.4 and updated new packages and security…
November 19, 2020
Organizations Are Losing The Battle Against Vulnerabilities
Organizations Are Losing the Battle Against Vulnerabilities There’s no such thing as perfect, bug-free software. No matter what…
November 9, 2020
Google Patches Chrome ZERO-Day Vulnerability – Update Now
Google Patches Chrome Browser ZERO-Day Vulnerability – Update it Now Finally, the Google has patched zer0-day vulnerability in…
November 3, 2020
WordPress Site Redirecting To Spam? Here’s How You Fix it
Visitors Getting Redirected To Other Websites? How to Detect and Fix This Problem? Are you hearing your customers…
October 26, 2020
How To Capture PCAP Logs With Wireshark
Today, we are working to capture the PCAP LOGS with the help of Wireshark. Organization following logs are…
October 22, 2020
Multiple Cloud Threats Continue To Plague 2020
The booming cloud security market is expected to be worth in excess of $585 million by the end…
October 21, 2020