14.6 C
Munich
Friday, April 26, 2024
- Advertisement -

TAG

Hacking

4 Free Online Tools to Check if a Website is Dangerous

Don't rush and click links a random person puts out on social media, forums or websites. It is a common method for malicious actors...

Find Information About a Person on Instagram with OSINTgram

OSINT or "Open Source INTeligence" plays a critical role in the field of cybersecurity. It can be used by your company to boost your...

A List of Tools to Help you Detect the Log4j Vulnerability

How can you detect the Log4j zero day vulnerability (known as Log4shell)? Here’s a list of FREE Log4j vulnerability scanner tools. Amazon Inspector and AWS The Amazon...

Threat Actors Impersonating Pfizer

Phishing campaigns that use COVID-19 as a hook are still on the rise. Hackers are increasingly using vaccine-related emails in their targeted spear-phishing attacks. Lately,...

How To Find Domains Owned by a Company

Why Should You Find Domains Owned by a Company? During a black box, or grey box penetration testing engagement for a company, one of the...

Find Web Server Vulnerabilities With Nikto

What is Nikto Nikto is an open source scanner capable of scanning for over 6700 items to detect any misconfigurations on web servers like Apache,...

The King of Most Common Passwords Still Sits on its Throne

The King of Most Common Passwords Still Sits on its Throne!!NordPass has published a study with the top 200 most common passwords for 2021....

What is a “Zero-Day” Exploit

What is a Zero-Day Exploit, what is the timeline of a zero-day attack, examples of zero-day attacks and ways to defend your organization.

Penetration Testing: Pre-Engagement Interactions

One important and often overlooked step in the penetration testing process is the pre-engagement interactions with the client. Preparation is key for every PenTest...

Latest news

- Advertisement -