Not only Flipper Zero: a hacker multitool from an old smartphone
They say that laziness is the engine of progress. As for me, competition works better. The ability to freely choose devices, applications, and information is now the…
They say that laziness is the engine of progress. As for me, competition works better. The ability to freely choose devices, applications, and information is now the…
You can find various interpretations of the concept of AppSec on the web. In this article, we will try to understand what should be included in AppSec, what skills are…
In the new version v9.8.5, Nuclei Templates have added templates for checking AWS Cloud configuration. In this post, we will discuss automating the verification of incorrect…
Machine learning is now used to a greater or lesser extent in various industries. Cryptographic analysis is no exception. In this article, we will look at the CipherGAN…
It is no secret that bug hunting is gaining popularity every year, attracting the attention of both companies seeking to improve the security of their products and white…
IDOR vulnerabilities are among the most common security vulnerabilities in modern web applications and APIs. It is not surprising that they are often recommended to novice…
In this material, we will talk about the methodology and set of tools for determining the location, routes, owner, and inspections of a merchant vessel in four simple…
Fintech has truly revolutionized the field of financial services. The accelerated development of technology and the growing interest in digital financial solutions have…
Imagine: you have several thousand files, and for each one you need to extract metadata - creation dates, modification dates, and last access. Of course, you can sit…
In June 2023, Red Hat made a controversial decision to change the way it distributes the source code of Red Hat Enterprise Linux. Social media erupted with heated discussions,…
When conducting any pentest of a corporate network, one of the actions of white hackers is to search for information that is practically in the public domain: on file…
My career in information security began, like many others, with work in IT infrastructure. Initially, my company was engaged in maintaining the stability of networks…
BI.ZONE WAF Cyber Threat Analytics and Research Department studied the statistics of attacks on web applications protected by BI.ZONE WAF. We compared this information…
Imagine: you have a large company with offices from Moscow to the Far East, hundreds of facilities, thousands of shift workers, and an ancient 1C server that barely copes…
We delve into Open AI's privacy policy and find out why experts have dubbed GPT-4o the "data turbo vacuum cleaner".
In a world where cyberattacks are becoming more frequent, it is important to understand the process of incident response in information security.
Fuzzing is a very popular software testing technique using random input data. There are a huge number of materials on the web about how to find software defects using…
Hello, tekkix! My name is Irina, I am an information security analyst at Avito. In this article, I share our experience and my personal impressions of building the information…