In this post, you will learn about how I could find the unauthenticated file upload vulnerability in Synology and, according to Synology’s highest amount for website […]
Ransomware, a malware that is capable of encrypting the files of the user. This eventually leads to a demand for ransom in exchange for restoring the […]
The pandemic of COVID-19 has changed the every day propensities for many individuals, and working schedules are no exception. With a large number of people abruptly […]
About the Webinar Phishing and Malware attacks on the mobile devices of remote workers have become quite common to gain access to sensitive enterprise data. A […]
What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
A worldwide catastrophe this contagious virus COVID-19 pandemic has raised endless problems to mankind. The restrictions we face today are something humans are not used to. […]
An Application Programming Interface (API) is a component that enables communication between two different applications. They can be applications developed on different platforms and it uses […]
What is HTTP Request Smuggling? Hiding HTTP Request in HTTP Request. That is the main idea. Simple, right? Well, we can say that HTTP Request Smuggling […]