Blog

September 13th, 2019

KDE 4/5 Kdesktop File Command Injection

printer exploitation

The KDE 4 and 5 (< 5.60.0) versions are found to be affected by the command injection vulnerability in the KdesktopFile class.

September 9th, 2019

Network Printers are vulnerable to hackers

printer exploitation

Last year's cyber attack in order to promote PewDiePie's youtube channel throws light in another, often disregarded network device i.e. Printer.

September 5th, 2019

The Cookie-Session Fundamental

DDoS Attack

The Hypertext Transfer Protocol, popularly known as the HTTP is an application layer protocol used to access web resources over the internet.

August 30th, 2019

WS-Discovery protocol can be abused to launch massive DDoS attacks

DDoS Attack

Security researchers have found that attackers can abuse the Web Services Dynamic Discovery (WS-Discovery) protocol to launch massive distributed denial of service (DDoS) attacks.

July 25th, 2019

What is a Cyber Attack? List of recent cyber attacks

cyber attack

A cyber attack is a malicious attempt by an individual or organization to breach the information system of another individual or organization.