Pentest tool in focus: Metasploit

Kali Linux 2018.2 released

Offensive security released their second incremental update on Kali Linux i.e Kali Linux 2018.2.  This release comprises of all the updated packages and bug...
Vevo’s YouTube account Hacked: Popular videos deleted

Vevo’s YouTube account Hacked: Popular videos deleted

In this ever-growing technology era, one has to ensure the data they put on the internet is in safe hands. No matter which platform...
Kali Linux 2018.1 released

Kali Linux 2018.1 released

Kali Linux 2018.1, the first of the many versions of Kali Linux for this year is now available. This release contains all the updates...

Vulnerability Assessment

"Finding a risk is learning, Ability to identify risk exposure is a skill and exploiting it is merely a choice" In this article by Vijay...

Planning and Preparation

In this article by Jason Beltrame, authors of the book Penetration Testing Bootcamp, Proper planning and preparation is key to a successful penetration test....

To Optimize Scans

In this article by Paulino Calderon Pale author of the book Nmap Network Exploration and Security Auditing Cookbook, Second Edition, we will explore the...

Essential skills for penetration testing

Cybercriminals are continally developing new and more sophisticated ways to exploit software vulnerabilities, making it increasingly difficult to defend our systems. Today, then, we need...

Web Application Information Gathering

In this article by Ishan Girdhar, author of the book, Kali Linux Intrusion and Exploitation Cookbook, we will cover the following recipes: Setup API keys...

Introduction to Network Security

In this article by Warun Levesque, Michael McLafferty, and Arthur Salmon, the authors of the book Applied Network Security, we will be covering the following...

Finishing the Attack: Report and Withdraw

In this article by Michael McPhee and Jason Beltrame, the author of the book Penetration Testing with Raspberry Pi - Second Edition we will...

Must Read in Security

Machine learning based Email-sec-360°surpasses 60 antivirus engines in detecting malicious emails

E-mail is the traditional, primary, and the most vital part of communication within business organizations. They hold minutes of important discussions, confidential documents as...

Interviews