Common Technique Used by Threat Actors to Weaponize PDFsIn the vast and complex world of cybersecurity, danger often hides in the most unsuspecting corners, stalking stealthily where our guard is…Sep 11, 2023Sep 11, 2023
What it is, XSS how it works, and how to prevent it.Cross-site scripting is probably a term you’ve heard of if you’re a developer. According to OWASP, one of the top 10 most prevalent web…Sep 9, 2023Sep 9, 2023
WinRAR vulnerable to remote code execution, patch now! (CVE-2023–40477)A public proof-of-concept (PoC) exploit and technical details for an unpatched Windows zero-day privilege elevation vulnerability has been…Sep 8, 2023Sep 8, 2023
Bypass URL ParserExploit vulnerabilities based on attacks such as Path Traversal, Authentication Bypass & Bypassing 2FA.Apr 21, 2023Apr 21, 2023