Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: Malware

Identifying vulnerabilities and potential victims

September 1, 2021 Ionut Morosan

Introduction Nowadays, the cybersecurity field is becoming more and more important in everyday life as technologies evolve continuously and more malicious people, so-called hackers, want

Continue reading

Top Posts

  • My experience with the OSCP certification
  • Mobile penetration testing on Android using Drozer
  • Exploiting Timed Based RCE
  • Practical JSONP Injection
  • Mobile Pentesting 101 - Bypassing Biometric Authentication

Blog Stats

  • 598,009 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 157 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (13)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (25)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 157 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar