malware
CryptoAPI in Malware
Research & Threat Intel
For a considerable period, cryptography algorithms with varying levels of complexity have been detected in most malware families. Many have...
From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...
credentials theft.
Credential theft: the business impact of stolen credentials
Research & Threat Intel
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data has a variety of...
From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...
What to expect from a web application penetration test
Application Security
In the digital age, web application penetration testing is one of the most critical elements of an organization’s vulnerability management...