


Common and Uncommon types of SQL Injection
In this article, we’ll explain some of the most common and uncommon types of SQL Injection. We’ll also discuss how these attacks can impact your company and your customers, and show you the measures you need to take to mitigate and minimize such risks.

Google Dorking: Manual and Automated Methods for finding Hidden Information
In this article, we will showcase how to effectively use Google Dorking to uncover hidden and sensitive information on websites. Google Dorking enables security researchers to proactively discover and address potentially sensitive information that might not be intended for public access.

The Difference between White-Box and Black-Box Pentesting
The Difference between White-Box and Black-Box Pentesting Post Views: 47 Reading Time: 3 Minutes Introduction Each Pentesting solution is different, with varying expertise and specialties. Before you decide who will perform it and which approach you will take, it’s...
How Misconfigurations in Linux can leave you vulnerable to Attackers
Security misconfigurations in Linux systems occur when necessary security controls are not properly implemented for servers or web applications. In this article, we’ll emphasize the importance of detecting and addressing misconfigurations through practical examples and tools like Nmap and the Metasploit Framework.

How do QR Codes work and how criminal hackers use them to generate phishing attacks – Demo
In this article, we’ll explore the pervasive presence and potential risks associated with QR codes in daily life. We’ll discuss the ease with which malicious QR codes can be created, either manually or through specialized tools, allowing attackers to embed harmful payloads. A tutorial its included, emphasizing its role in creating various types of malicious QR codes for security testing purposes.