Office 365 – End to End Security – Can you believe We Have 198 Use Case for SOC Monitoring
Cloud Era. Everything becoming Cloud now. But are you really looking into all the settings before you buy? Specially Security Services behind the Cloud ? Most of the Cloud Service [...]
Bug Bounty – It’s Easy now? Life Changer. Fill your bag with $$$
Potential knowledge and Passion towards security will definitely helps you to fill the bag Lot of myth's around "Bug Bounty", Let's understand what it is and benefit of it and [...]
XBash – Data Wiper, Bot & Ransom- Linux & Windows
Revolution and Evolution is Persistent on Malware's and Ransomware's. After seeing Specially X Bash it's been proved the threat is getting high day by day. Xbash carrying Data Destructive [...]
MacOS Backdoor Implanted or a Feature – iTerm2 ???
Git Lab researcher recently reported an issue that "iTerm2 Sending passwords in Plan Text to the ISP DNS Server's and various things from the MacOS" iTerm is used by 150,000-200,000 [...]
New Bankbot Equipped with UAE Banks
Android Malware’s are tremendously increasing day-by-day. New Bankbot setting up the trademark about mobile security and how the victims are trapped in a simple fashion The recent post from [...]





Get Social