Recent Posts

Posted in Vulnerabilities

D-Link camera vulnerability MITM bug

On the ESET blog, they have mentioned that D-Link has a Man-In-The-Middle attack that can allow the attacker to tap D-Link Camera video stream. A…

Continue Reading...
Posted in Vulnerabilities

Security Flaw on Huawei 2011’s Device

On CNBC, the U.K.-based Vodafone which is the world’s second-largest mobile operator has stated in a statement such as The issues were identified by independent…

Continue Reading...
Posted in News

Windows 10 will uninstall buggy update

Lately, Windows 10 have automatically uninstall any recent update that will causing a wreaking havoc within Operating System. The reason of this activity is that…

Continue Reading...
Posted in Application Tutorial

Exiftool

What is Exiftool? Exiftool is an open source tool that read, write and edit any meta related to Jpeg, Pdf, Audio, and Video. The purpose…

Continue Reading...
Posted in Vulnerabilities

CVE-2019-5786 Chrome Vulnerability

What is CVE-2019-5786? Recently, Chrome Vulnerability (CVE-2019-5786) exploit is in the wild and it has caught the attention of Justin Schuh, Google Chrome’s security lead…

Continue Reading...
Posted in Information Security

Access Control

What is Access Control? Access Control is a one of the central of security policy where it focuses on the control policy for the user…

Continue Reading...
Posted in Vulnerabilities

Adobe ColdFusion Zero-day Vulnerability

What is Adobe ColdFusion Zero-day? Recently, Adobe have released an patch for the Adobe ColdFusion Zero-day for the following effected version: ColdFusion 11 ColdFusion 2016…

Continue Reading...
Posted in Tutorial

Web Application assessment tools

When we talk about Web Application assessment tools, most of us will think about Acunetix, and Nikto where it can be consider as popular nowdays….

Continue Reading...
Posted in Vulnerabilities

CVE-2019-5736 Vulnerabilities

Recently, there is a new vulnerabilities which announce in runc (an popular container platforms called Docker & Kubernetes). How the Vulnerability work? The attacker can…

Continue Reading...
Posted in News

Patch on Zero-Day Apple device

Recently, Apple have released a patch updates for Apple device that using the iOS and macOS Mojave where the vulnerabilities such as CVE-2019-7286 ( Privilege…

Continue Reading...