Categories
Latest Posts

Kubernetes Cluster Interactive Architecture Diagram
Kubernetes Cluster – Interactive Architecture Diagram

OWASP TOP 10 – Flashcards
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards

Cybersecurity and Ethical Hacking Terminologies – Flashcards
Cybersecurity and ethical hacking terminologies Flashcards

Kubernetes Cluster Setup in Laptop Using VirtualBox
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.

log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution vulnerability. This vulnerability has been found in Apache Log4j library, which is an open source logging utility which is written in Java and developed by Apache Software Foundation. This library is… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Enabling Root User in Kali Linux
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali Linux is disabled and when you try to login you will get password is incorrect error. In this case, you will have to install a package and make some modifications… Read More »Enabling Root User in Kali Linux

Dom Invader – Burp Suite tool to Find DOM Based XSS Easily
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.

NMAP CHEATSHEET
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
Latest CyberSecurity News, Trends, and Articles
Get yourself updated with the latest technology and cybersecurity news and articles.
- Researchers Find Backdoor in School Management Plugin for WordPressby noreply@blogger.com (Ravie Lakshmanan) on May 21, 2022 at 5:11 am
Multiple versions of a WordPress plugin by the name of “School Management Pro” harbored a backdoor that could grant an adversary complete control over vulnerable websites. The issue, spotted in premium versions before 9.9.7, has been assigned the […]
- Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the…by noreply@blogger.com (Ravie Lakshmanan) on May 21, 2022 at 4:20 am
Cisco on Friday rolled out fixes for a medium-severity vulnerability affecting IOS XR Software that it said has been exploited in real-world attacks. Tracked as CVE-2022-20821 (CVSS score: 6.5), the issue relates to an open port vulnerability that […]
- Hackers Gain Fileless Persistence on Targeted SQL Servers Using a Built-in…by noreply@blogger.com (Ravie Lakshmanan) on May 21, 2022 at 3:13 am
Microsoft on Tuesday warned that it recently spotted a malicious campaign targeting SQL Servers that leverages a built-in PowerShell binary to achieve persistence on compromised systems. The intrusions, which leverage brute-force attacks as an […]
- Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submitby noreply@blogger.com (Ravie Lakshmanan) on May 21, 2022 at 3:13 am
A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users’ email addresses are exfiltrated to tracking, marketing, and analytics domains before such information is submitted and […]