RHADAMANTHYS: An In-Depth Analysis of a Sophisticated Stealer Targeting Israeli UsersIn the ever-evolving landscape of cyber threats, a new campaign targeting Israeli users has brought the sophisticated RHADAMANTHYS stealer…Aug 2, 2024Aug 2, 2024
Introducing The New GitScanner As a Platform!In today’s digital landscape, where code is the backbone of every software project, ensuring the security of your Git repositories is…Jul 31, 2024Jul 31, 2024
Unveiling Hidden Git Repositories: A Deep Dive into the Git Source Code Disclosure ScannerIn the vast landscape of cybersecurity, one often overlooked vulnerability can expose an entire organization's codebase to potential…Jul 28, 20241Jul 28, 20241
You have an outdated version of “Submit a ticket” (Help Desk Software) by Kayako?(This will be a less technical article and more article to warn any site that uses the product, So that there will be no situation where…Dec 17, 2020Dec 17, 2020
How did I find Reflected XSS at Harvard University Catalyst WebsiteDo you want to know how i did it?Apr 1, 2020Apr 1, 2020