The Union Government To Come Up With National Cyber Security Strategy 2020
National Security Adviser Ajit Doval announced that the Union government is set to come up with National Cyber Security Strategy...
National Security Adviser Ajit Doval announced that the Union government is set to come up with National Cyber Security Strategy...
A fast tool to scan CRLF vulnerability written in Go Installationfrom BinaryThe installation is easy. You can download a prebuilt...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
IPG Photonics, a leading U.S. manufacturer of high-performance fiber lasers for diverse applications and industries was hit by a ransomware...
The popular encrypted email service Tutanota was hit with a series of DDoS attacks this week targeting its website fist and...
Mozilla addressed a bug that can be exploited by attackers to hijack all the Firefox for Android browsers that share...
 Recently, India's largest data agency NIC ( National Informatics Center) was hacked by a malware unidentified as of yet....
A new vulnerability named Zerologon has been identified by cybersecurity organization, Secura who tracked the high rated vulnerability as CVE-2020-1472;...
Wireshark plugin to work with Event Tracing for Windows Microsoft Message Analyzer is being retired and its download packages were...
Scan only once by IP address and reduce scan times with Nmap for large amounts of data. Unimap is an...
Even though some organizations and companies may not realize it, their domain name is an important asset. Their web presence...
The Presidential Council for the Development of Civil Society and Human Rights is planning to create a working group. Its...
 The concept of business and marketing has seen a tremendous change for a few years. Business continuity meant protecting your...
A malicious program that steals passwords was sent out in mid-September by scammers in letters claiming to be from the...
A Blind XSS Injector tool FeaturesInject Blind XSS payloads into custom headers Inject Blind XSS payloads into parameters Uses Different...
CRLFMap is a tool to find HTTP Splitting vulnerabilitiesWhy?I wanted to write a tool in Golang for concurrency I wanted...
Data makes the world go round, more often than not via advertising and its tracking mechanisms. Whether you think making...
 As the Coronavirus pandemic prompted an expansion in cyberattacks, this called for the need for certain facilities that would explicitly...
This Time Flies Apple Event was unlike a regular Apple Event, and the difference was noted right from the beginning...
A Payload Injector for bugbounties written in go FeaturesInject multiple payloads into all parameters Inject single payloads into all parameters...
Pipe different tools with google dork Scanner Installzoid@MSI ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX zoid@MSI ~/dorkX> cd dorkX zoid@MSI ~/dorkX> go build...
On Tuesday September 15th, the US House unanimously passed the IoT Cybersecurity Improvement Act . The bill, sponsored by Reps....
Let’s talk about the reality of the remediation process today. We know it is often a cumbersome and time-consuming process,...
The founder of Telegram Pavel Durov gave the messenger with the data of all users to the Kremlin because the...