Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

What is Non Compliance ? A Guide for Risk and Consequences

PCI DSS Non-Compliance impacting the business in various ways and leads to a variety of consequences. PCI DSS is a set of information security standards for corporations that help safeguard...

[Australian Cyber Conference 2019] Keynote

Top 10 ways to make hackers excited: All about the shortcuts not worth taking  Signing a secure architecture can always be more expensive, time-consuming, and complicated. But does it make sense...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

as-a-Service – Crooks Sell Passwords on Hacking Forums

Threat actors advertising a new Combolists-as-a-Service model to sell credentials on the underground hacking forums that enable account takeovers. Attackers employ several methods to gain access to the account that...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

What is Non Compliance ? A Guide for Risk and Consequences

PCI DSS Non-Compliance impacting the business in various ways and leads to a variety of consequences. PCI DSS is a set of information security standards for corporations that help safeguard...

[Australian Cyber Conference 2019] Keynote

Top 10 ways to make hackers excited: All about the shortcuts not worth taking  Signing a secure architecture can always be more expensive, time-consuming, and complicated. But does it make sense...

9 Android Zero-day Vulnerabilities Affects Billions of Android Devices

Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice calls, caller ID spoofing, unauthorized call operations, DOS attack, and...

Nmap 7.80 – 80+ Improvements with Bug Fixes, Npcap, NSE Scripts/libs

The new version of Nmap 7.80 released in Defcon, Vegas by Gordon Fyodor, network security and created of Nmap. This new version of Nmap 7.80 upgraded with more than 80...

What is Non Compliance ? A Guide for Risk and Consequences

PCI DSS Non-Compliance impacting the business in various ways and leads to a variety of consequences. PCI DSS is a set of information security standards for corporations that help safeguard...

APLICATIONS

How to Build an Industrial Sensor

One of the most effective ways for many businesses to safeguard their profits is by closely monitoring inventory. This is particularly important for...

HOT NEWS