CyberNews

In pursuit of diversity

Security Magazine |  In Pursuit of Diversity | 2020-11-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience.

Read More »

Bringing PRE into Enterprise

Adam PenningtonOct 27, 2020 · 6 min read Written by Adam Pennington and Jen Burns We’re excited to announce that we’ve released the latest version of MITRE ATT&CK (v8), which

Read More »

Deanonymizing Tor using ML

Standard Tor Traffic and Machine Learning /ML/  Unlike conventional non-Tor encrypted traffic that comes with openly visible destination attributes such as IP addresses (both source and destination) and port number,

Read More »

Blockchain second-layer protocols

The Limitations of the Blockchain Blockchain technology was a major innovation.  The original Bitcoin whitepaper, authored by the pseudonymous Satoshi Nakamoto, described the first system that made a fully decentralized

Read More »

Database Penetration Testing

In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate

Read More »

Deepfake

Introduction “Deepfake” isn’t a new type of beauty cream, an underwater virtual tour or even a sternly worded insult. It is in fact, the culmination of decades worth of audio

Read More »

QRLJACKING and QRLJACKER

In this post, i would like to share one attack method that will take advantage on QR Code which called Quick Response Code Login Jacking (QRLJacking). QRLJacking is a new

Read More »

Federated Learning

Introduction Privacy used to be so common (in the 1990s and early 2000s) that you literally could not escape it. Interactive advances in technology, social media not being the least

Read More »