Photo by Tima Miroshnichenko from PexelsWhat is Threat Hunting?Threat Hunting refers to proactively looking for threats in your network. Threat Hunters actively search the network for any indication or sign of a threat or breach, whether known or unk...
(Photo by Stargrass/Shutterstock)Earlier this month, a ransomware attack occurred at Mercury IT, a managed service provider based in New Zealand with 25 employees. This attack caused disruptions for several organizations in the country, including sev...
Photo by freestocks on UnsplashWhat is OAuth?Open Authorization (also known as OAuth) is an open-source framework that allows you to create accounts on websites without having to create a different user account for each website. They rely on authenti...
Alex Chumak on UnsplashThis article is dedicated to log4j and how it’s being exploited in the wild by attackers.Log4jApache Log4j, a project of Apache Software Foundation, is a Java-based logging utility. It is written in java and is a package locate...
Hello Bug Hunters 👋🏼Happy Friday!Hope you are all doing great.Today we are sharing an ongoing compilation of resources we have found helpful and tools we use. If you’re new to InfoSec and are looking for a concentrated list of resources to get star...
Wassup bug hunters! 🚀Hope you are all having an awesome week 🙂Here is our suggestion for a great GitHub repo with lots of tools that you can use for bug bounty 🥷Moreover, it is categorized; as Recon, Exploitation, etc.📝 We recommend adding it to...
Photo by Chris Ried on UnsplashIntroductionThe C programming language is well-known for being extremely susceptible in various ways. Even today, when students in undergraduate programs are taught to code, they are first exposed to C or Java programmi...
SourceIntroductionWhen performing a web application penetration test, Burp Suite is the first choice of most security professionals. Due to its support for extensions, it is a really powerful tool to make your life a lot easier. In this blog post, we...
https://www.reseller.co.nz/innovation_awards/Awesome News🎉Capture The Bug is thrilled to announce that it has been selected as a finalist for the Reseller News NZ Award under the NZ WIDE INNOVATION (National) and — START-UP INNOVATION (Product) cate...
In the world of cyber security, there is a constant battle between white hat hackers (security researchers who identify vulnerabilities to improve security) and black hat hackers (hackers with malicious intent). While black hat hackers often find and...