Embrace the Cloud: Revolutionizing How We Do Business

shutterstock_189489224

Local storage is for the birds. Plenty of modern companies are still using physical servers, but nearly all of them function primarily as a backup system. The most sophisticated corporations don’t even keep these servers onsite, because the benefits of

Twitter Phishing Attack Targeting Bank Of America Customers

Computer internet credit card security concept with padlock

Social media is widely used for promoting news and products but at the same time it is used for malicious intent such as promoting phishing websites. over this week Malwarebytes published an article about a Twitter account claiming to be

J2EEScan Burp Suite Plugin to Test J2EE Applications

J2EEScan is a plugin that you can add on Burp Suite security scanning tool. The goal of this plugin is to improve the test coverage during web application penetration tests on J2EE applications. The plugin is fully integrated into the

SMS Password Reset Phishing Used to Compromise Emails

Symantec

Social engineering is a simple and effective way to compromise user credentials. people are vulnerable and sometime have no ability to prevent some simple attacks. This is related to human capacity so for example memory problem where user have no

rop-tool – Tool to help you write binary exploits

rop-tool is a set of tools that you can use to search gadgets, Patch binaries , Print info about binary, Display heap structure and Disassemble the binary. the tool is open source and consists of a set of internal controls,

Duqu Malware Attack Kaspersky Lab Corp

Duqu Malware Attack Kaspersky Lab Corp

Kaspersky Lab have announced over this week a successful malicious attack against the corporate network.  Attack was firstly discovered in the spring of 2015. The report disclosed that cyber criminals used Duqu 2.0 malware to infect companies across several locations

DylibHijack- Dylib Hijack Scanner

apple-vuln

DLL Hijacking a technique that is widely used by malware writers, this to infect users , launch certain applications or make a privilege escalation. some of the tools that you can use to detect DLL hijacking on windows are: CrowdInspect