ZeroLogon Vulnerability

Lately, I heard a lot of ZeroLogon been mentioned in most of the internet browser/website. Due to that, I will also update the post with ZeroLogon Vulnerability. What is ZeroLogon […]

Border Gateway Protocol

A protocol such as Border Gateway Protocol(BGP) normally used for routing information on Exchange which been work between ISP like different ASes and the internet. How BGP works and Characteristic? […]

Zoom’s Vulnerability Security Measure

Due to recent bugs or vulnerabilities in Zoom Application that have exposed to the public, Zoom has announced some security measures to ensure their customer’s privacy. Zoom Application is one […]

Pentest Tool Framework

Pentest Tools Framework is a Penetration Testing tool that uses several exploits database with scanners. The interface looks identical to Metasploit with a simple type of UI/UX design for beginner […]

Let’s Encrypt revoke the certification

Due to the software bug, Let’s Encrypt will revoke around 3 millions of certification today. The software bug that been discovered on their backend’s code will impact the Certificate Authority […]

Cryptography Review

Those who are working in IT department, they sure aware of Cryptography method where nowadays are been used for encryption of the traffic. There are four types of Cryptography key […]

Secure over the Network

Nowadays, most everyone uses the internet for personal and business users over the network device (Router/Switch). However, the organization only do some protection on their server and system where they […]

Cyberattack via Whatsapp

Recently, Cybersecurity people and companies will take serious notice of the latest hacking event that happens within this week such as Whatsapp Hack. A group of hackers has been targeting […]

IDA 7 Guide

In this post, I would like to talk about IDA 7 tools which are been used for reverse engineering application The tools have been developed by Hex-Rays, a private organization […]

TLS Downgrade Attack

We will focus on TLS Downgrade attack method in this post where we will learn about what and how to detect the attack. TLS Downgrade attack is an attack that […]