Unleashing the Power of Bug Bounty Programs
Bug Bounty, also known as Vulnerability Rewards Program (VRP), is a proactive cybersecurity initiative that incentivizes ethical hackers and security…
Denial of Service Attacks-DOS
Definition A type of attack that overloads the system with traffic to prevent legitimate users from accessing the cloud service…
Threat Hunting and Testing for CVE-2020-0601 – PoC – Windows CryptoAPI Spoofing Vulnerability
NSA published one of the latest bug which will be having widespreading impact on how HTTPS communication will be conducted.…
Ransomware Cyber Attack on City of Atlanta
Atlanta officials confirms cyberattack on city servers As per recent news, City of Atlanta Confirmed that its under cyberattack “The…
CALDERA – Automated Adversary Emulation System
CALDERA is an automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks. It generates plans during…
Malware Analysis-Collective Intelligence
During reverse engineering and incident response procedure it is always advisable to detect about malware activities which can hint on…
Ransomware Market Analysis
Ransomware Market Analysis-Researchers at Carbon Black examined the ransomware market for about two months and came up with some interesting…