Blog English

LIMEVPN HACKED – THOUSANDS FROM USERS’ DATA IS OUT AND SOLD

Another fast-paced maneuver started the day at Cyber World. LimeVPN, a VPN service, was recently hacked, exposing the personal information of thousands of users. Following Facebook and LinkedIn, 69,000 LimeVPN customers’ information is now exposed on the dark web! They are also in the process of selling thousands of user records on the Dark Web

LIMEVPN HACKED – THOUSANDS FROM USERS’ DATA IS OUT AND SOLD Read More »

Why Is Penetration Test Important To Your Business?

In today’s world, it is almost impossible to imagine a business without an Internet connection such as a website, email, employee training, CRM (Customer-relationship management), CMS (Content management system). E-commerce, new customer search, record search and retention, etc. simplifies and speeds up the ordering process. Some businesses use off-the-shelf solutions, some hire professionals to build

Why Is Penetration Test Important To Your Business? Read More »

DNS SECURITY

Information security How to hide DNS requests from your ISP’s prying eyes Encrypting the traffic between your device and a DNS service will prevent unauthorized persons from monitoring the traffic or committing a fraud. The end of net neutrality and the weakening of ISPs’ rules for managing network traffic have raised many privacy concerns.  ISPs

DNS SECURITY Read More »

The Threat of Data Theft: Credential stuffing

The Threat of Data Theft: Credential stuffing When we talk about cyber attacks against companies, one word usually comes to mind: malware.  These software can infect systems and not only valuable confidential corporate information but also users, customers, employees, company suppliers, etc.  It’s also capable of stealing information. What is credential stuffing? A credential stuffing

The Threat of Data Theft: Credential stuffing Read More »

OWASP TOP 10: INJECTION VULNERABILITY

Information security Injection vulnerabilities are usually vulnerabilities caused by command execution or user data inclusion that are not controlled or prevented. According to statistics, 28% of organizations are affected by this vulnerability. This vulnerability is divided into the following attack vectors: Injection through SQL, LDAP, XPath queries. Injection with commands in operating systems Injection via

OWASP TOP 10: INJECTION VULNERABILITY Read More »