Search Results for: authentication URL Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been...
Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features...
Blog Post A Banking Trojan is Back Because of COVID-19 April 1, 2020 COVID-19 is currently the most common and popular topic in cyberattacks. Recently, the Zeus Sphinx banking Trojan program has been...