Iran Threat Actors Exploit ..Monitor..

Researchers recently pieced together the activity, showing the limits of the cyber industry’s knowledge of Tehran-linked hacking against those who often bear the brunt of it: Iranian citizens. The findings…
Camera 📷 can Eavesdrop

Camera 📷 can Eavesdrop

Millions of connected security and home cameras contain a critical software vulnerability that can allow remote attackers to tap into video feeds that goes wild warns CISA. The bug (CVE-2021-32934,…

iOS Zero Day ! Going Wild

Apple shipped out-of-band security patches to address two zero-day vulnerabilities in iOS 12.5.3 that it says are being actively exploited in the wild aimed at a range of older models…
SIP Abused with XSS

SIP Abused with XSS

The SIP communications protocol can be abused to perform cross-site scripting (XSS) attacks. SIP technology used to manage communication across services including VoIP, audio, and instant messaging, can be used…
Penetration Testing Tools

Penetration Testing Tools

While going through Penetration Testing, it's worthwhile to writeup a post on tools widely used in the various categories Testing Tools are categorised mainly in to five categories Information GatheringWeb…
Penetration Testing Standards

Penetration Testing Standards

While going through penetration testing process, its worthwhile to post on standards and framework been followed . Below are few standards that getting followed in Penetration Testing process. 1. OSSTMM…

Penetration Testing Types

While going through the threats and vulnerabilities its worthwhile to write up a post on process and methods by which a vulnerability is identified and remediated. This is a second…

Bluetooth Security Ache

While going through the various Bluetooth attacks , its worthwhile to post in on the types of attacks prevails currently Bluebugging. Bluebugging is a type of a Bluetooth attack through…