In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT… Read More

In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT… Read More
Advanced Persistent Threat attack – learn what is and how it works The number of cyber attacks is increasing on the internet nowadays. It is not surprising that the World Economic Forum and Global Risk Report placed in 2018 cyber… Read More
Adding CA to an Android system and bypass SSL pinning protections are two very important steps in testing the security of different applications. After my latest article – How To Install And Root Your Android Emulator – I received a… Read More