A new threat is on the horizon.And this new paradigm promises to be the most profound shift for security professionals since the dot-com boom of the nineties.I’m talking about blockchains...
There are two types of File Inclusion Vulnerabilities: Local File Inclusion (LFI) and Remote File Inclusion (RFI).These inclusion vulnerabilities are very similar to Directory Traversal attack. I will explain more...
As organizations increasingly rely on SaaS solutions for business-critical applications, it’s becoming apparent that even the big providers eventually suffer outages. Recently, Microsoft customers suffered problems with Teams and Exchange...
What if hackers took control of your car? This hypothetical has been floating around for decades as an illustrative example of what could happen when cyber attacks bleed into the...