Search Results for: Subdomain Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach. Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level... Blog Post Google hides “www” and “https://” from Chrome February 1, 2020 Google has decided to hide the “www” trivial subdomain, “http” and “https://” in the address bar when visiting a website.... Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling... Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse... Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Blog Post PayPal SMS Identity Theft February 13, 2020 PayPal – one of the most frequently used applications for money transfer and other online payments across the globe was... Blog Post Does Chrome’s Showing Full URL Setting Make You More Secure? March 29, 2020 Engineers at the Google Chromium project are working on a new setting to show the full URL of the website... Blog Post Fortnite Vulnerability Exposes 80 million accounts January 18, 2019 Epic games, patched a vulnerability that potentially exposed over 80 million Fortnite accounts. According to a security research firm, Check... Blog Post Malvertising Campaign Spewing Neutrino Exploit Kit Thwarted December 8, 2016 Security researchers have helped put an end to a global malvertising campaign that put millions of users at the risk... Blog Post Montenegro Election Day Sees DDoS Attacks from Cybercriminals October 18, 2016 The Ministry for Information Society and Telecommunications of Montenegro have revealed that several prominent websites were targeted by cybercriminals with...
Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach.
Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Blog Post Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
Blog Post GoDaddy Takes Down 15,000 subdomains selling online scams April 26, 2019 GoDaddy took down 15,000 subdomains used in online scams. Online spam campaigns targeted users using fake celebrity endorsements to sell...
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...
Blog Post Google hides “www” and “https://” from Chrome February 1, 2020 Google has decided to hide the “www” trivial subdomain, “http” and “https://” in the address bar when visiting a website....
Knowledge Center ParamSpider – Mining parameters from dark corners of Web Archives May 29, 2020 Have you ever wondered how to scrape all the parameters from domain and subdomains from the past without manually crawling...
Blog Post EyeWitness – Capture Screenshots of Any Website March 12, 2020 EyeWitness is an open-source tool, designed to take screenshots of the web pages from a file. This tool can parse...
Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Blog Post PayPal SMS Identity Theft February 13, 2020 PayPal – one of the most frequently used applications for money transfer and other online payments across the globe was...
Blog Post Does Chrome’s Showing Full URL Setting Make You More Secure? March 29, 2020 Engineers at the Google Chromium project are working on a new setting to show the full URL of the website...
Blog Post Fortnite Vulnerability Exposes 80 million accounts January 18, 2019 Epic games, patched a vulnerability that potentially exposed over 80 million Fortnite accounts. According to a security research firm, Check...
Blog Post Malvertising Campaign Spewing Neutrino Exploit Kit Thwarted December 8, 2016 Security researchers have helped put an end to a global malvertising campaign that put millions of users at the risk...
Blog Post Montenegro Election Day Sees DDoS Attacks from Cybercriminals October 18, 2016 The Ministry for Information Society and Telecommunications of Montenegro have revealed that several prominent websites were targeted by cybercriminals with...