Categories
Latest Posts

Kubernetes Cluster Interactive Architecture Diagram
Kubernetes Cluster – Interactive Architecture Diagram

OWASP TOP 10 – Flashcards
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards

Cybersecurity and Ethical Hacking Terminologies – Flashcards
Cybersecurity and ethical hacking terminologies Flashcards

Kubernetes Cluster Setup in Laptop Using VirtualBox
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.

log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution vulnerability. This vulnerability has been found in Apache Log4j library, which is an open source logging utility which is written in Java and developed by Apache Software Foundation. This library is… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
Enabling Root User in Kali Linux
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali Linux is disabled and when you try to login you will get password is incorrect error. In this case, you will have to install a package and make some modifications… Read More »Enabling Root User in Kali Linux

Dom Invader – Burp Suite tool to Find DOM Based XSS Easily
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.

NMAP CHEATSHEET
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
Latest CyberSecurity News, Trends, and Articles
Get yourself updated with the latest technology and cybersecurity news and articles.
- Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Methodby noreply@blogger.com (Ravie Lakshmanan) on July 6, 2022 at 7:09 am
The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method. “With its latest variant carrying several major upgrades, Hive […]
- Researchers Share Techniques to Uncover Anonymized Ransomware Sites on…by noreply@blogger.com (Ravie Lakshmanan) on July 6, 2022 at 6:06 am
Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure. “Most ransomware operators use hosting providers […]
- Researchers Uncover Malicious NPM Packages Stealing Data from Apps and Web…by noreply@blogger.com (Ravie Lakshmanan) on July 6, 2022 at 6:06 am
A widespread software supply chain attack has targeted the NPM package manager at least since December 2021 with rogue modules designed to steal data entered in forms by users on websites that include them. The coordinated attack, dubbed IconBurst […]
- Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the…by noreply@blogger.com (Ravie Lakshmanan) on July 5, 2022 at 1:54 pm
Google on Monday shipped security updates to address a high-severity zero-day vulnerability in its Chrome web browser that it said is being exploited in the wild. The shortcoming, tracked as CVE-2022-2294, relates to a heap overflow flaw in […]