Cyber-Security

HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

RCE (Remote Code Execution) RCE is an attack that allows the attacker to access a victim (another computer user) computer without authorization and remotely execute malicious code.  For this demonstration, we are going to gain unauthorized access and then execute some of our code to bring down the whole system.   NOTE:  This tutorial is …

HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM Read More »

Top 5 Tools and Practical Steps in Checking Website Vulnerability

With an estimated 547,000 new websites daily, 380 new websites every minute, and 7 new websites every second; over 1.7 billion websites are currently online worldwide. Securing a website from being hacked is much more difficult than building one, as most users don’t know much about security or where to look for vulnerabilities in their …

Top 5 Tools and Practical Steps in Checking Website Vulnerability Read More »

Reinforcing Security for Tomorrow’s Software

The need for security has evolved as data has become the new gold. Every tech organization’s biggest challenge is securing its users’ data. While data security has not been easy, the statistics are more gloomy, 30,000 websites are lost to hackers daily, and 20 websites every minute. Security breaches and case studies According to Upguard, daily data …

Reinforcing Security for Tomorrow’s Software Read More »