Kubernetes Cluster – Interactive Architecture Diagram
OWASP TOP 10 – Flashcards. Learn OWASP Top 10 using flashcards
Cybersecurity and ethical hacking terminologies Flashcards
Kubernetes Cluster Setup in Local Machine Using VirtualBox and Ubuntu.
log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
What is log4shell ? “Log4Shell” got its name by researchers at LunaSec and credited to Chen Zhaojun of Alibaba. It is an remote code execution vulnerability. This vulnerability has been found in Apache Log4j library, which is an open source logging utility which is written in Java and developed by Apache Software Foundation. This library is… Read More »log4shell 0-day Exploit in log4j v2 – What it is? How to Identify and Mitigate the Vulnerability (CVE-2021-44228)
In some of the cases you may need to login using the superuser root in Kali Linux. However, by default the root user in Kali Linux is disabled and when you try to login you will get password is incorrect error. In this case, you will have to install a package and make some modifications… Read More »Enabling Root User in Kali Linux
Quickly Find Dom-Based XSS Vulnerabilities with Burp Suite’s Dom Invader.
Nmap Cheatsheet – Network Mapper tool used to scan networks and devices.
Get yourself updated with the latest technology and cybersecurity news and articles.
- Canadian Netwalker Ransomware Affiliate Sentenced to 20 Years in U.S….by email@example.com (Ravie Lakshmanan) on October 5, 2022 at 6:13 am
A former affiliate of the Netwalker ransomware has been sentenced to 20 years in prison in the U.S., a little over three months after the Canadian national pleaded guilty to his role in the crimes. Sebastien Vachon-Desjardins, 35, has also been […]
- Mitigation for Exchange Zero-Days Bypassed! Microsoft Issues New…by firstname.lastname@example.org (Ravie Lakshmanan) on October 5, 2022 at 5:31 am
Microsoft has revised its mitigation measures for the newly disclosed and actively exploited zero-day flaws in Exchange Server after it was found that they could be trivially bypassed. The two vulnerabilities, tracked as CVE-2022-41040 and […]
- Russian Hacker Arrested in India for Reportedly Helping Students Cheat in…by email@example.com (Ravie Lakshmanan) on October 4, 2022 at 6:21 pm
India’s Central Bureau of Investigation (CBI) on Monday disclosed that it has detained a Russian national for allegedly hacking into a software platform used to conduct engineering entrance assessments in the country in 2021. “The said accused was […]
- Popular YouTube Channel Caught Distributing Malicious Tor Browser Installerby firstname.lastname@example.org (Ravie Lakshmanan) on October 4, 2022 at 3:39 pm
A popular Chinese-language YouTube channel has emerged as a means to distribute a trojanized version of a Windows installer for the Tor Browser. Kaspersky dubbed the campaign OnionPoison, with all of the victims located in China. The scale of the […]