Blog

Home / Blog

Task Hijacking StrandHogg (Pt. 2)

Hello, and welcome back! Hopefully you’ve already gone through Task Hijacking (StrandHogg) Vulnerability Part 1, learning how to identify StrandHogg vulnerabilities. If this is your

Read More »
task hijacking blog

Task Hijacking (StrandHogg), Part1

StrandHogg is an Android vulnerability in which malicious applications exploit its multitasking system to display falsified applications like legitimate ones on devices running Android OS.

Read More »
ChatGPT for Pen Testing (Pt. 2)

ChatGPT for Pen Testing (Pt. 2)

In our previous blog, we discussed how ChatGPT could be vital in providing vital assistance during penetration testing. This groundbreaking AI technology can offer essential

Read More »
Cyber Security Training

Cyber Security Training

In today’s rapidly evolving digital landscape, cybersecurity has become more important than ever. As cyber threats increase, organizations are prioritizing protecting their digital assets more

Read More »
Assembly language

Introduction to Assembly Language

Assembly language programming is an intriguing field where programmers interact directly with the computer’s hardware. In this introductory guide to assembly language programming, we will

Read More »