How to Bypass RootBeer’s Root Detection

During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device.
Machine Learning in the Context of SIEM
In this article we are going to see how machine learning was used to help automate a task in cyber security.
Branding Protection

Our world is surrounded by brands, even if we talk about global brands or small local brands that are trying to become popular, we see them everywhere. But why do we trust a brand? In this article,…
PHP’s Git Server Hacked to Insert Secret Backdoor to Its Source Code

In yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a secret…
Remediation of Exchange Server Vulnerabilities
This guidance will help customers address threats taking advantage of the recently disclosed Microsoft Exchange Server on-premises vulnerabilities CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and…
5 Măsuri de Securitate Cibernetică în Era COVID-19
Ultima perioadă este cu siguranță una deosebită, prin care noi toți nu am mai trecut. Într-un timp relativ scurt, Covid-19 a pus o presiunea uriașă în toate domeniile de activitate.
How Easy Is It to Crack a Password?
Cracking a password can be easier than you think, by the time you’re done with this article you’ll be aware of how important it is to have a strong password.
Guidance in Cyber Security Trainings

In the need to increase their cyber security resilience, companies start searching for cyber security trainings . This thing, in fact, is a very normal and recommended action.
How to Expand Your Attack Surface
Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface?
Can We Detect APT Attacks?

In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is…