NAT Slipstream attack affect NAT

NAT Slipstream attack has been found recently and they would be a new method that makes uses the Network Address Translation(NAT) and firewalls which the attacker will take advantages of […]

Android Banking New Trojan

Recently, a trojan called Alien which is a new ‘fork’ of Cerberus Banking Trojan that normally targets victim’s credentials from more than 200 mobile applications includes Bank of America and […]

Border Gateway Protocol

A protocol such as Border Gateway Protocol(BGP) normally used for routing information on Exchange which been work between ISP like different ASes and the internet. How BGP works and Characteristic? […]

AzureADRecon tool for reconnaissance Azure AD

Information Gathering which also known as reconnaissance is an activity that will be run by Security Consultant/Pentester. The purpose of the activity is to gather more information on the machine’s […]

Security Standards

What is Cyber Security Standards? When talking about Cybersecurity Standards, a lot of people out there will think only ISO standards which will cover the area of privacy protection, integrity, […]