SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.
There is no doubt about the strength of Apple security features. It seems that it is time to say goodbye to Apple’s controversial feature from its macOS operating system. That means Apple’s applications are not allowed to bypass content filters, VPNs, and third-party firewalls. These applications that contain more than 50 popular apps, besides the…
On the 15th of February, the Joker’s Stash “the biggest vendor of the dark web” stops operating. It means that one of the largest data sellers that is notorious for selling compromised payment card data is going to leave the arena of the dark web. The question is that, will it be a chance to…
The mobile remote access Trojan reached the gates of the Android world. Researchers have warned Android users of the risk of exfiltration of their information, such as photos, locations, contacts, and messages from popular apps such as Facebook, Instagram, WhatsApp, Skype, Telegram, Kik, Line, and Google Messages. This danger is derived from a second threat…
While too many people still don’t know anything about Hardware security keys, such as those from Google and Yubico, Companies are trying to introduce them as the most secure hardware ever. Although these tools are highly resistant to phishing and takeover attacks, the new attacks could let hackers Clone Hardware security keys. An electromagnetic side-channel…
Reverse proxy in computer networks is a type of proxy server, which receives the resources and requests of a client and directs them to one or more servers. The reverse servers perform as the opposite of a forward proxy server, receiving user requests from outside the internal network to smooth the flow of network traffic…
” how to hack Google ?” is probably one of the most interesting questions that any hacker may ask from himself. Hackers have always been on the lookout for ways to hack Google and its tools. Now, it seems that some have managed to find their way. One of the tools that Google uses to…
Lack of crowdsourced cybersecurity has made SolarWinds Orion vulnerable against a zero-day vulnerability on the authentication bypass section. The vulnerability that may make it possible to deploy the SUPERNOVA malware in target environments. Regardless of the reasons such as lack of crowdsourced cybersecurity contributing to this vulnerability, let us read what exactly Carnegie Mellon University…
Intelligence prevents us from repeating our mistakes. That is also what Cyber threat intelligence technology rewards us. This technology attempts to block and remediate vulnerabilities, based on the target network’s history. As it is flexible and dynamic enough to be adopted with different networks, we call it intelligence. This technology gets smarter by identifying each…
Windows Task Scheduler is a tool that allows you to create and run virtually any task automatically. Typically, the system and certain apps use the scheduler to automate maintenance tasks (disk cleanup, and updates), but anyone can use it. With this experience, you can start applications, run commands, and execute scripts at any particular day…
Researchers have revealed a new malware campaign that they dub the Hornet’s Nest. What makes this attack distinguished is the deployment of six different malware variants in one go. These include crypto-miners, info stealers, crypto-stealer, and a backdoor. Though the campaign doesn’t appear as sophisticated compared to say a zero-day, it does, however, deploy six…