Category: Vulnerability

Read our latest blog posts

Why monitoring the most popular P2P messenger should be a cybersecurity...

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly...

Continue reading

What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that...

Continue reading

Quickstart Shodan: What is it and how does it work

Security professionals, government agencies trust Shodan to alert them on unmanaged IoT devices. Learn more about Shodan...

Continue reading

GraphQL 101: Here’s everything you need to know about GraphQL (Part...

Although GraphQL is one of the most efficient alternatives to REST API, it is vulnerable to attacks....

Continue reading

Pen-testing IoT Devices for Vulnerabilities

Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in...

Continue reading