Scorpiones Group
Loading

Articles

Organization network

ReDTunnel - Redefining DNS Rebinding Attack

Have you ever thought about how to access a victim's internal network without running Malware on his computer or using 0day?..

Are you human?

The difference between reCAPTCHA v2 and v3

As bots that try to pass as actual humans become more sophisticated, Google has released new versions of its reCAPTCHA API. The most recognized version of this test involves typing in distorted text, ..

Clouds

How to Delete Synced Information in Chrome Browser

When you sign in to Chrome using your Google Account, a lot of your personal information gets saved and synced across all your devices, from an Information Security aspect, this is a nightmare...

Information Security Awareness at Work

10 Tips for Information Security Awareness

Employees play a crucial role in running a successful business. An untrained and negligent workforce can put your enterprise in danger of multiple data breaches. Organizations must adopt an easy to ac..

App permission safety

Protecting Your Data Through App Permissions

Requesting (and being given) permission for an app to perform operations that can provide access to user credentials, personal documents and images, personally identifiable or health information throw..

AI Malware

AI Infused Malware Is The New Security Threat To Worry About

A work of fiction? Is the future is here? In this article you will learn that in the near future, Artificial Intelligence will be able to hack, manipulate and compromise your organization's or persona..

Phishing Campaign

Phishing Attacks increase During The Holidays

Spring in Israel isn’t just about blooming flowers and holiday vacations. It’s also peak season for phishing when scammers use email, text messages, and fake websites to trick people into giving up th..

WPA3 Hacking

Security Flaws in WPA3 Protocol Lets Attackers Hack your WiFi Password

Security researchers have discovered several serious vulnerabilities in the WPA3 that could allow attackers to recover the password of the Wi-Fi network using downgrade attacks or side-channel leaks. ..

Closeup code

The difference between Penetration Testing and Red Team

Penetration testing versus red teaming. We often hear them used together, but in fact, they’re two different things. So, what exactly is the difference between the terms between penetration testing an..

Contact Us

SEND A MESSAGE