Posted in Information Security

CyberSecurity Risk for Vendor Management

When talking about Vendor Security, we will be thinking about building an ecosystem where the vendor will cross path with enterprise or management to bridge…

Continue Reading...
Posted in Information Security Tutorial

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send…

Continue Reading...
Posted in Information Security

Local File Inclusion

For those are not familiar with Security Assessment, An attack method called Local File Inclusion where it will exploit any vulnerable inclusion procedure that been…

Continue Reading...
Posted in Vulnerabilities

CVE-2017-11774

Introduction Nowadays, an attacker is trying to exploit an old vulnerability that been found in the year 2017 on Microsoft Outlook (CVE-2017-11774).  This malware has…

Continue Reading...
Posted in Mobile

Mobile Masterclass Part 2

Methodology of Mobile Application Penetration Testing Discovery Discovery phrase will be defined as Information Gathering phrase where it is the most important stage in any…

Continue Reading...
Posted in News Tutorial

Riltok Trojan

Kaspersky researchers did found a money-stealing mobile malware where it can launch new variants of malware to the smartphone device The malware have extend their…

Continue Reading...
Posted in News

Instagram Recovery

Recently, Instagram is having test their new features, which will make life harder for the attacker to compromise the victim’s account. A High-Profile Instagram account is…

Continue Reading...
Posted in Vulnerabilities

Exim flaw is under attack on Linux Server

As of last Thursday Amit Serper, Cybereason’s head of security researchers has warned about the attackers that might be exploiting the Exim flaw to gain…

Continue Reading...
Posted in News Tutorial

BlueKeep Ticking bomb

Bluekeep or also called CVE-2019-0708 is a vulnerability that related to critical remote code execution bug which found in older and legacy version of Windows…

Continue Reading...
Posted in Vulnerabilities

Cisco IOS XE software update

Last Wednesday, a High Severity Cisco flaw has been found and been announce in the public alongside with the patch. However, there is no workaround…

Continue Reading...