Tevora Threat Blog
SQLmap; Customizing tools to get the job done
Often we run into a false-positive SQLi (SQL injection) using SQLmap. Even then, our team will attempt to dig deeper and sometimes we hit roadblocks. By working on client’s project and faced the exact challenge. After careful enumeration and testing, an entry point was found that was vulnerable to SQLi.
Malicious Cryptomining & Other Shifting Threats
Tevora Talks dForce $25 Million Crypto Hack, Blockchain, Blackmarket and security with Kevin Soltani
PsyOps: Deep Dive into Social Engineering Attacks
Social engineering campaigns continue to be one of the primary methods that adversaries use to gain an initial foothold in an organization. Red teams and Advanced Persistent Threat (APT) groups often times use phishing techniques and pretexted phone calls to coerce users to either disclose sensitive information or execute malicious…