Top TOOLS for Web Application CTF (Capture the Flag)
Here you will find most common tools used to capture the flag. Below listed tools are used for web application testing. Burpsuite Burpsuite is an GUI based tool used toRead More →
Here you will find most common tools used to capture the flag. Below listed tools are used for web application testing. Burpsuite Burpsuite is an GUI based tool used toRead More →
The team of web application security specialists at vpnMentor has discovered a massive breach in a database operated by Autoclerk, a reservation management system owned by Best Western Hotels &Read More →
A recent investigation by vulnerability testing specialists at security firm SafeBreach Labs has revealed the presence of a critical vulnerability in the Avira 2019 antivirus tool software. Tracked as CVE-2019-17449,Read More →
The activities of government-sponsored hacker groups can have disastrous consequences. A group of digital forensics experts from ESET has revealed the existence of a new malware developed by Winnti, aRead More →
Even security companies are exposed to cyberattacks. IT system audit specialists report that security software developer Avast has become victim of an attack on their internal networks. Through a statement,Read More →
When you want to launch your business in deep web there are lot of things to worry about like hosting, privacy, anonymity and getting a onion url. First step toRead More →
A new hacking incident against famous actresses has been revealed. Cybersecurity experts report that singer and actress Demi Lovato has become the victim of a threat actor, an incident thatRead More →
According to digital forensics experts, Cisco has embarked on a new workday full of security patches to fix multiple critical vulnerabilities present in its Aironet wireless access points, widely usedRead More →
Although many people ignore it, Google states that Android apps available on the Play Store cannot be updated or modified from third-party sources, although web application security experts say itRead More →
A new security flaw has caught the attention of vulnerability testing experts. A recently published report mentions that a severe vulnerability in the Linux operating system could allow a nearbyRead More →