In this article, the core concepts of Kerberos delegation will be described, followed by an analysis of Kerberos delegation and unconstrained delegation...
Lateral movement is a stage in which the attacker tries to deepen his grip by moving to other devices in the network. In this article we will show how to move between different machines, devices or as..
Cybersecurity researchers recently uncovered a new critical vulnerability affecting the Server Message Block (SMB) protocol that could allow attackers to leak kernel memory remotely..
Hundreds of WordPress sites are hacked every day. Statistics say that 98% of successful cyber-attacks against WordPress sites happen because of outdated plugins and themes...
Your internet connection transmits your IP address thus making it possible to track you online, learn how to keep your connection private...
A penetration test, also known as a pen test, is a simulated cyberattack against your computer system to check for exploitable vulnerabilities. Want to learn more? click now...
Learn now about Incident Response Team, and how can it assist your organization in remediating cyber-attacks and emerging threats...
In this article we will explain the term “Red Team”, how does a Red Team Operation work and what are it’s benefits. Check it now...
Cyber criminals are taking advantage of the coronavirus crisis, people are distracted and much more vulnerable, everyone is at home practicing social distancing, using their electronic devices more th..