What is “Content-Type: application/x-protobuf”: Protobuf Explained For Hackers
Have you ever come across this header:
Content-Type: application/x-protobuf
Read on to know what it means and what are possible attack scenarios.
Continue readingCyberSecurity Revolution
Have you ever come across this header:
Content-Type: application/x-protobuf
Read on to know what it means and what are possible attack scenarios.
Continue readingBadBotHoneypotEndpoint is used by AWS customers who do not want bots, unauthorised spiders and scrapers to scan their site. It works by blacklisting IP addresses of such bots. I discovered a vulnerability with this endpoint that could allow an attacker to blacklist random IPs.
Continue readingThis is the story of a juvenile SSRF bug who did know it had the potential to look at AWS secrets. 😮
Continue readingCheck Point Software Technologies Ltd. (Check Point), a leading provider of cybersecurity solutions has found a bug that could let an attacker deliver a specially crafted group chat message that causes a crash of the WhatsApp application for all members of the group chat.
Continue readingGlobal Positioning System (GPS) is one technology which has never been looked at through a security lens by the wider audience. We have become dependent on the GPS for our day-to-day lives. However, it is no longer reliable.
Continue readingEvery security researcher, information security personnel or IT personnel should understand CVSS well because this scoring system not only helps you understand the intrinsic severity of the vulnerability but it also provides a way to modify the severity level specific to your environment.
Continue readingA new ransomware, dubbed PureLocker, has been identified by researchers that is being used for targeted attacks against production servers of enterprises.
Continue reading