Blog

ATM Assessment

I'm sure that most of the people know what Automated Teller Machine (ATM) is and…

QRLJACKING and QRLJACKER

In this post, i would like to share one attack method that will take advantage…

Importance of Security in Domain Name

Nowadays, a lot of organizations create a Domain Name for their website and internal usage.…

Vulnerabilities that been published within 4 years ago

For the past three years, a lot of vulnerabilities have been published in the security…

CyberSecurity Experience

In this post, I would like to share the CyberSecurity Experiences that I gained while…

Data Breach Assessment

What is Data Breach? Nowadays, there is a lot of Data Breach has been spread…

AWS Penetration Testing Review

What is AWS Penetration Testing? AWS (Amazon Web Service) Penetration Testing can also be considered…

XML Injection Attack review

In this post, I would like to share about XML Injection Attack that might be…

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays…

Monkey Testing Review

While I was surfing the internet, I found the terms "Monkey Testing" where it has…