Nullcon is a well-known Indian cybersecurity conference and first time held in the Berlin, Germany location. The conference is known for its technical research talks and […]
Recently on www.ubercomp.com, a post was made regarding how the Redis sandbox was broken for Debian and Debian derived Linux distributions. Also, it was mentioned that […]
In the Spring Framework, a new remote code execution vulnerability has been discovered and named CVE-2022-22965. Overview On March 30, 2022, various websites and technical blogs […]
Hello there! Today we will discuss something scary but interesting: The “Ransomware attack”. Occasionally we hear from people about their data being tied up, and it’s […]
Why Is Gartner Talking About External Attack Surface Management (EASM) In a recent report from Gartner, External Attack Surface Management (EASM) has been introduced as an […]
What is Log4J? Log4j is an open-source logging utility offered by Apache Software Foundation. This logging library is widely used by businesses in its application to […]
With 2.5 billion android users across 190 countries, the digital expansion offers limitless opportunities for businesses. But along with opportunities come the challenges that plague the […]
Introduction to postMessage() The application uses the window.postMessage () method to allow cross-origin communication between different window objects. This method provides a way to circumvent the […]
What is WebSocket? Efficient two-way communication protocol WebSocket is stateful where HTTP is stateless Two main parts: Handshake and data transfer WebSockets allows the client/server to […]