Cybersecurity Framework by NIST(National Institute of Standards and Technology)
NIST Cybersecurity framework pdf The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. This Framework is designed to protect critical infrastructure of the United States…
New Internet Explorer vulnerability Microsoft confirms
This is considered client side vulnerability. Where the user on their computer can click on a webpage or link using Flash and then the system will be compromised (a malware…
Hackers – explaining what it is and some hacks
this blog is an interesting tips and tricks site: http://tipstrickshack.blogspot.com/ (also explains hackers terminology a bit) The author describes several hacks on vulnerabilities within wordpress 3.51 (today latest is 3.8).…
what kind of attacks can come?
attacks will come in all types and methods, some will be standard – and some turbo charged. The reason a new vulnerability is such a big deal, is that any…
more pentesting tools in the toolkit
Hydra, w3af, Scapy are all good as well. We can create our own scans using scapy – as we can create our own scan reviews depending on the environment that…
