In this article, we will demonstrate how you can set up your vulnerable CouchDB for pen-testing in Ubuntu 20.4
In this article, we will demonstrate how you can set up your vulnerable CouchDB for pen-testing in Ubuntu 20.4
This tool pretty much creates the fake logon screen on victim computer. Victim might think he accidentally logged off but that’s not the case.
Google experienced difficulties on a large scale for it’s online services, such as YouTube, Google Meet, Google Maps, Google Calendar.
Microsoft has released the security patches for recently discovered 58 security flaws as it’s final patch Tuesday for 2020. With these patches, the total number of CVE has reached 1250 for this year.
we will go through the web security vulnerability known as Server Side Request Forgery. It allows the attacker to send the malicious HTTP request to the server.
These vulnerabilities were found in the FontParser and Kernel of iOS. Allowing the attacker to remotely execute the arbitrary code with kernel-level benefits.
You get a very lethal combination of challenges when you combine encryption with malware. This is a computer virus that is called "ransomware." This type of virus is part of the "crypto virology" field of research.
Cisco on 4 November 2020 revealed a zero-day vulnerability of publicly accessible proof-of-concept exploit code in the Cisco AnyConnect Secure Mobility Client Software.
As I was working on my laptop the other day the popup appeared saying your Antivirus is expired do you want to renew it?. Till you renew Windows Defender will protect your system. So it got me thinking that is antivirus necessary? As the name suggests, antivirus software is a virus-resistant application. It identifies or recognizes the virus and works to eliminate it from the computer system after the identification of the virus.
Google has set out an update to Chrome web browser version 86.0.4240.111 that addresses five security bugs, including vulnerabilities that are proven to be actively exploited by attackers.