Toggle menu

5 Tips to win Bug Bounty

January 17, 2020

5 Tips to Win Bug Bounty

Detox Author Comments are off
A bug bounty program is a deal offered by many websites and software developers by which any ethical hacker can receive recognition and reward for reporting bugs, especially those pertaining to exploits and vulnerabilities. In this blog, we are going to talk about 5 rules to running a successfully bug bounty.  Bug bounty is a kind of reward which is given by the company when someone identifies an error or vulnerability in a software or
Bug Bounty, Social Engineering   , , , ,
Cyber Threat of Ransomware

January 16, 2020

Cyber Threat of Ransomware in 2020

Detox Author Comments are off
We talked about Malware in our last blog “Cyber Threat of Malware in 2020” and here we will dive into Ransomware which has many of the same characteristics of most traditional forms of malware. What is Ransomware? It’s a form of malware that has a special purpose, it encrypts data files on the infected computer and instructs the user to send money to attackers in order to recover their information. It presents a serious threat
Cyber Security Awareness, Social Engineering   , , , , , , , ,
Cyber Threat of Malware in 2020

January 10, 2020

Cyber Threat of Malware in 2020

Detox Author Comments are off
What is Malware? Malware has been a serious security threat to both individuals and organizations since the late 1980s. It’s a catch-all term for any software that is designed to gain unauthorized access to computers or network equipment with the goals of causing damage, extracting information or making money for the attackers. “China is the country with the most Malware in the world” Malware can take on many forms like Viruses, Adware, Worms, Trojan, Rootkits,
Cyber Security Awareness, Social Engineering   , , , , , , , ,
Tricky Phish Angles for Persistence, Not Passwords
Late last year saw the re-emergence of a nasty phishing tactic that allows the attacker to gain full access to a user’s data stored in the cloud without actually stealing the account password. The phishing lure starts with a link that leads to the real login page for a cloud email and/or files storage service. Anyone who takes the bait will inadvertently forward a digital token to the attackers that gives them indefinite access to
Cyber Security News, News   , , , , , ,
Best Security Testing Tools

January 7, 2020

5 Best Security Testing Tools of 2020

Detox Author Comments are off
There are various tools used for security testing, but here we are going to talk about the 5 best vulnerability assessment and penetration testing tools that are commonly used while performing security tests. At Detox Technologies, we use these tools in security testing: 1-   Burp Suite: Burp Suite is the world’s most widely used web application security testing software. It comes in 2 versions – Burp Suite Professional for hands-on testers, and Burp Suite Enterprise
Penetration Testing Tools, Security Testing Tools   , , , , , , , ,

PRODUCT & SERVICES

Detox Pro

Our Services

TERMS & POLICIES

Privacy Policy

© Copyright 2020 Detox Techologies