Tech
A dangerous vulnerability was found in Telegram for Windows.
User X (Twitter handle: @LizaFlux) shared a new vulnerability found in Telegram for Windows. During file auto-loading, arbitrary code execution…
Meta’s Facebook and Instagram Faced Outages
March 5, 2024 – In an unexpected turn of events coinciding with Super Tuesday, Meta Platforms, the social media giant…
Reddit: How the Platform Stands For User Privacy Despite Lawsuit
Filmmakers Hunt for Pirate Commenters on Reddit, But Hit Wall Twice Millions of daily Reddit users unknowingly became potential targets…
Education
What is DNS Spoofing?
Today, the internet has become an integral part of our lives. From banking to shopping to travel, every aspect of…
How to Disable Directory Listing on your Web Server
What is Directory Listing? Directory listing, also known as folder listing or directory index, is a feature provided by web…
TCP: What Kind Of Protocol Is It?
In what cases do we need TCP packet analysis? In practice, modern network traffic analysis systems have an extensive database…
Top 10 XSS Tools In 2023
To assist security professionals and ethical hackers in their mission to protect web applications, we have compiled a list of…
Main Types of Authorization
What is Authorization? Authorization is the process of determining what resources a user or process can access. It is an…
How do Hackers Bypass Antivirus Protection?
Alert This is article only for educational purposes! × Dismiss this alert. What is Merlin? Merlin is an HTTP/2 Command…
Tools
TOP 10 Tools for Anonymity on the Internet
In today’s world, where digital data plays a crucial role in everyday life, ensuring privacy and anonymity on the internet…
h8mail | OSINT for Searching Exposed Credentials
h8mail is an email OSINT and password breach-hunting tool. It can be used to find email addresses and passwords leaked…
pwnat | Bypass NAT/Firewall Tool
Pwnat is a game-changer for anyone who has ever struggled to connect devices behind separate NAT firewalls. Developed by Samy…
Scanners Box | Powerful Hacker Toolkit
Scanners Box, also known as Scanbox, is a comprehensive open-source security testing toolkit. It brings together over 10 categories of…
Github Dorks – Tool for Searching Google Dorks
GitHub Dorks is a Python tool that can be used to search for sensitive data on GitHub repositories. It can…
5 Essential Extensions for Burp Suite
Burp Suite is a platform for conducting security audits of web applications. It includes tools for mapping web application structures,…
Cybersecurity
How To Protect LAN Against ARP-Spoofing
If a hacker runs a sniffer (e.g., Wireshark) on a local network, they won’t see anything interesting besides their own…
TOP 10 Tools for Anonymity on the Internet
In today’s world, where digital data plays a crucial role in everyday life, ensuring privacy and anonymity on the internet…
Red Team, Black Day: Why Experienced Pentesters Fail in Red Team
This article is a translation of the original article from habr.com by user secm3n, and it is a real example…
Latest Articles
How To Protect LAN Against ARP-Spoofing
If a hacker runs a sniffer (e.g., Wireshark) on a local network, they won’t see anything interesting besides their own…
Pavel Durov (Telegram) Arrested in France
Several French media outlets reported last night that Pavel Durov, the founder of Telegram and VKontakte, was detained at an…
TOP 10 Tools for Anonymity on the Internet
In today’s world, where digital data plays a crucial role in everyday life, ensuring privacy and anonymity on the internet…
Attacks
5 Domain Attacks And How To Prevent It
1. Domain Phishing Imagine a masterfully crafted fake website – identical to your bank’s – luring you to share your…
SQL-Injection: Analysis of Real Example
SQL injection is an attack that can lead to compromising sensitive data and even complete system takeover. It’s important for…
Browser Security
Enhancing Online Security with Secure and Encrypted Browsers
What is a Secure and Encrypted Browser? Secure and encrypted browsers are designed with robust security features to protect users’…
Understanding Potential Security Threats for Popular Web Browsers
Web browsers have become an integral part of our digital lives, but it’s crucial to be aware of potential security…