Hacking
-
How an IDOR Vulnerability Led to User Profile Modification
According to the 7th Annual Hacker-Powered Security Report, IDOR makes up 7% of the vulnerabilities reported via the HackerOne platform. Government…
Read More » -
Thief Raccoon – Login Phishing Tool
Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating…
Read More » -
How Hybrid Password Attacks Work and How to Defend Against Them
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge…
Read More » -
Telekopye transitions to targeting tourists via hotel booking scam
The growing popularity of online marketplaces has attracted fraudsters preying on unsuspecting buyers and sellers, looking to score payment card…
Read More » -
Pentesting for Internal Networks | HackerOne
Testing Methodologies HackerOne’s testing methodologies are grounded in the principles of the PTES, OSSTMM, NIST SP 800-115, and CREST and can be…
Read More » -
INTEL – OSINT and Cyber Intelligence Tool
Pip-Intel is a powerful tool designed for OSINT (Open Source Intelligence) and cyber intelligence gathering activities. It consolidates various…
Read More » -
OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation
Oct 10, 2024Ravie LakshmananCybercrime / Disinformation OpenAI on Wednesday said it has disrupted more than 20 operations and deceptive networks…
Read More » -
Mind the (air) gap: GoldenJackal gooses government guardrails
ESET researchers discovered a series of attacks on a governmental organization in Europe using tools capable of targeting air-gapped systems.…
Read More » -
The Recruitment Process: What to Expect When You Apply at HackerOne
If you’re considering applying, here’s a look at what you can expect from the process, from the initial application to…
Read More » -
Cross-Platform, Cli App To Perform Various Operations On String
sttr is command line software that allows you to quickly run various transformation operations on the string. // With input…
Read More »