This website uses cookies for security purposes only. We do not track you or see your data.
HTTP Basic Authentication brief explanation HTTP supports several authentication mechanisms. Upon a request for resource within a protected space the…
Yesterday a partial dump containing email addresses and hashed passwords for the forum.arenabg.com members leaked. According to The Hackers News…
There are many SQL injection cheat sheets out there, but I just stumbled upon another one. It features very nice…
On 25th of August Team GhostShell published a list with leaks from hacks they supposedly committed. I will not discuss…
So the first thing I did was to search the source code to see which banks had been targeted and…
For those of you that never heard for Zeus trojan – this is special bread that targets online banking users,…
Purely technical The attacker count on weaknesses in protocol implementation, application, OS, firmware etc.. Those attacks can be easily automated…
To miss the target and to hit someone else instead can happen easily in a mil operation, but to deface…