Let's find out what zero-day exploits are, where they come from and who creates them. Why are zero-day vulnerabilities and exploits one of the most dangerous threats?
Penetration testing as a form of ethical hacking. Learn more about the legal ramifications for organizations that fail to comply with today’s pentest requirements. Read about the different approaches, purposes, and goals of penetration testing.
What are exploit kits? Read about the different types of exploits, vulnerabilities, and malware. Exploits attack vectors: zero-day, DoS, spoofing, XXS. How to avoid being victim of an exploit attack?
The CVE is a unique identifier for each vulnerability. Let's figure out how these unique identifiers are assigned and where to find information about CVE.