Author: Cybernoz
As per the latest findings of ThreatFabric, a version of the Android banking trojan with the name Xenomorph has been…
Passwords are still the weakest link in an organization’s network, as proven by the analysis of over 800 million breached…
In Facebook Graph API as defined by the developer documentation, there are several access tokens, to authenticate against various API…
Build, Break, and Hack WebSockets Source link
Is Apple deliberately killing our batteries? Source link
UniSA & Optus Cyber Security and Data Science Collaboration Hub chair Dr Mamello Thinyane Former United Nations University Institute computer…
Back in February of this year I hacked with members of BugBountyHunter.com on a public bug bounty program and we…
Proof of concept. The username of the database user starts with ‘hema’. BackgroundThese days almost every website uses a database….
GovTech’s Cyber Security Group recently organised the STACK the Flags Cybersecurity Capture-the-Flag (CTF) competition from 4th to 6th December 2020….
Microsoft is working on a new XAML-based gallery view for Windows 11 File Explorer. This new Gallery option can be…
Hello all! Its been a while since my last write up. As a-lot of you know, last year I joined…
Over the last year I’ve taken a step away from my usual bug bounty work to focus more on building…