Search Results for: authentication URL Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP... Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was... Blog Post Millions of YouTube Channels Hacked September 24, 2019 In a coordinated attack, malicious actors have hijacked thousands of YouTube creator accounts. Many of the YouTubers targeted in this... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post Unauthenticated Users can Enter Cisco Webex Private Conferences January 31, 2020 A severe vulnerability is detected in most popular Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could... Blog Post October is National Cybersecurity Awareness Month – Own IT. Secure IT. Protect IT. October 23, 2019 Internet-enabled crimes and cyber intrusions are becoming increasingly sophisticated and preventing them requires each and every user of a connected... Blog Post Smart-TV Bug Allows Rogue Broadcasts June 4, 2019 An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw. Smart-TV hijacking... Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been... Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Blog Post Fortnite Vulnerability Exposes 80 million accounts January 18, 2019 Epic games, patched a vulnerability that potentially exposed over 80 million Fortnite accounts. According to a security research firm, Check... Blog Post Critical Check-In Flaw Exposes British Airways’ Passengers August 16, 2019 A critical flaw in British Airways e-ticketing system exposed personal data of passengers. Researchers at Wandera, discovered the major security... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP...
Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was...
Blog Post Millions of YouTube Channels Hacked September 24, 2019 In a coordinated attack, malicious actors have hijacked thousands of YouTube creator accounts. Many of the YouTubers targeted in this...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post Unauthenticated Users can Enter Cisco Webex Private Conferences January 31, 2020 A severe vulnerability is detected in most popular Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could...
Blog Post October is National Cybersecurity Awareness Month – Own IT. Secure IT. Protect IT. October 23, 2019 Internet-enabled crimes and cyber intrusions are becoming increasingly sophisticated and preventing them requires each and every user of a connected...
Blog Post Smart-TV Bug Allows Rogue Broadcasts June 4, 2019 An attacker could gain remote access by chaining together an exploit for home routers with the TV flaw. Smart-TV hijacking...
Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been...
Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features...
Blog Post Fortnite Vulnerability Exposes 80 million accounts January 18, 2019 Epic games, patched a vulnerability that potentially exposed over 80 million Fortnite accounts. According to a security research firm, Check...
Blog Post Critical Check-In Flaw Exposes British Airways’ Passengers August 16, 2019 A critical flaw in British Airways e-ticketing system exposed personal data of passengers. Researchers at Wandera, discovered the major security...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...