Category: Mix
Update: On the OWASP Top 10 2021 proposed, Cross-site scripting (XSS) was moved from the top of the OWASP list…
I’ve been theorizing and researching prompt injection attacks. They’ve mostly been theoretical, though. In this post, I’m going to break…
Hacker101 is getting something brand new: our own Capture The Flag! For those who are unfamiliar, Capture The Flags (better…
Are you running WordPress 4.2.0 to 4.5.1? Time to upgrade to 4.5.2! It was recently discovered that WordPress versions 4.2.0 to…
Migrating your digital assets to the cloud can seem overwhelming at times. But you’re not alone. AWS has done a…
Secure Sockets Layer (SSL) is a cryptographic protocol designed to provide communications security over a computer network. SSL makes the…
Network security should be a major focus for companies moving to the cloud. Cloud networks are exposed to the Internet…
Are you running Magento version before 2.0.6.? Time to upgrade!It was recently discovered that all Magento versions before 2.0.6. (both Community and Enterprise…
“To improve the security of their connected systems, every corporation should have a vulnerability disclosure policy that allows them to…
We have listened to your feedback and added several requested features to our service. Ability to remove tags that have…
Hacktivity can save your company. Take help from hackers. You can’t do it alone. Approach hackers with an assumption of…
Insecure Direct Object Reference allows attackers to manipulate references to gain access to unauthorized data. A proof of concept video follows…



![[Alert] New WordPress XSS Vulnerability Discovered [Alert] New WordPress XSS Vulnerability Discovered](https://image.cybernoz.com/wp-content/uploads/2023/05/Alert-New-WordPress-XSS-Vulnerability-Discovered.png)



![[Alert] New Magento Vulnerability – Unauthenticated Remote Code Execution [Alert] New Magento Vulnerability - Unauthenticated Remote Code Execution](https://image.cybernoz.com/wp-content/uploads/2023/05/Alert-New-Magento-Vulnerability-Unauthenticated-Remote-Code-Execution.png)


