Search Results for: authentication URL Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang... Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post Millions of YouTube Channels Hacked September 24, 2019 In a coordinated attack, malicious actors have hijacked thousands of YouTube creator accounts. Many of the YouTubers targeted in this... Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was... Blog Post Unauthenticated Users can Enter Cisco Webex Private Conferences January 31, 2020 A severe vulnerability is detected in most popular Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could...
Knowledge Center Session Hijacking – Case Study April 28, 2020 LIFARS frequently conducts penetration tests to ensure the effectiveness of our client’s security implementations and to evaluate whether their systems...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post FBI Flash Alert Warns on OnePercent Group Ransomware Attacks September 14, 2021 In coordination with DHS-CISA, the FBI recently published a flash alert warning the public against the OnePercent Group ransomware gang...
Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Blog Post New CITI Bank Phishing Scam Tricking Users January 29, 2020 An advanced level of CITI bank phishing attack has emerged on the web. This attack utilizes the use of OTP...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post Millions of YouTube Channels Hacked September 24, 2019 In a coordinated attack, malicious actors have hijacked thousands of YouTube creator accounts. Many of the YouTubers targeted in this...
Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was...
Blog Post Unauthenticated Users can Enter Cisco Webex Private Conferences January 31, 2020 A severe vulnerability is detected in most popular Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could...