This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Bypass File Upload Restrictions on Web Apps to Get...
One of the most promising avenues of attack in a web application is the file upload. With results ranging from XSS to full-blown c...
Best of Wireshark Cheat Sheet
Wireshark Cheat Sheet
Automate XSS attack with Burp Suite XSS Validator
Automate your XSS attack with XSS Validator in BurpSuite Extender tool and even add your payload or search payload from google.
Top 10 web hacking techniques of 2022
Check the Top 10 Web Hacking Techniques of 2022, the 16th edition of Portswigger community powered effort to identify the most imp...
JD Sports Group Hacked
JD Sports, the high street sports fashion retail giant, has confirmed that it was targeted in a successful cyber-attack that has r...
How Hackers Can Become Persistent Threats
An academic analysis of website defacement behavior by 241 new hackers shows there are four clear trajectories they can take in fu...
3 Ways ChatGPT Will Change Infosec in 2023
OpenAI's chatbot has the promise to revolutionize how security practitioners work.
Bad USBs are SCARY!!
What you might think is just a regular usb flash drive is actually a BAD USB (badusb), a device designed by hackers to hack your c...
How to Be An Ethical Hacker: 2023 Edition
Do you want to become an ethical hacker? Need a little head start? Check it...
XSS Methodology for Beginners
what is XSS (Cross-site scripting)?
37 million T-Mobile customers were hacked
T-Mobile said a “bad actor” accessed personal data from 37 million current customers in a November data breach.
Criminals Access More than 30,000 PayPal Accounts
PayPal has informed its customers that a number of accounts were compromised at the end of December. The company promptly reset al...