close
close
Close
Home
Services
Blog
Contact Us
ABOUT
Home
Services
Blog
Contact Us
ABOUT
menu
Phone: +52-55-8882-0001
Email:
[email protected]
Welcome to Seekurity blog
El fraude detrás de las ofertas de trabajo vía WhatsApp
Hiram Camarillo
on September 21, 2022
comment
0 Comments
access_time
10 min read
An Interesting Cross-Site Scripting Vulnerability on "ton.twitter.com"
Seif Elsallamy
on January 21, 2022
comment
0 Comments
access_time
6 min read
Edge browser press and hold up-arrow for a second all your emails disclosed
Seif Elsallamy
on January 21, 2022
comment
0 Comments
access_time
3 min read
La pandemia de la inseguridad en las aplicaciones COVID19 de México
Hiram Camarillo
on October 26, 2020
comment
0 Comments
access_time
9 min read
CVE-2020-23014: APfell/Mythic macOS Post Exploitation and Red-Teaming Framework Authenticated Cross-Site Scripting Vulnerability [Advisory]
Mohamed A. Baset
on April 19, 2020
comment
0 Comments
access_time
3 min read
Security Vulnerabilities affects Online Services of Egyptian Telecommunications Company "Etisalat Misr"
Mohamed A. Baset
on September 30, 2019
comment
0 Comments
access_time
14 min read
إزاى تحمي نفسك إفتراضياً ومادياً
Mohamed A. Baset
on September 22, 2019
comment
0 Comments
access_time
3 min read
Video and Audio Eavesdropping in the era of Web Applications!
Mohamed A. Baset
on July 13, 2019
comment
0 Comments
access_time
16 min read
Advisory: MyBB Two Factor Authentication extension Vulnerabilities
Mohamed A. Baset
on July 10, 2019
comment
0 Comments
access_time
1 min read
Twitter Email Verification Bug let Hackers Impersonate Identities and Access Accounts on 3rd Party Services!
Seif Elsallamy
on July 9, 2019
comment
0 Comments
access_time
3 min read
Los sitios olvidados y hackeados del Gobierno Mexicano
Hiram Camarillo
on April 12, 2019
comment
0 Comments
access_time
4 min read
Twitter Denial of Service bug or How i could prevent all followers from reading or accessing literally ANY tweets!
Seif Elsallamy
on March 25, 2019
comment
0 Comments
access_time
4 min read
Business Logic Vulnerabilities Series: Hot Fixes Getting Cold, A journey of 7 Versions/Years of a sole Facebook vulnerability!
Ali Kabeel
on February 9, 2019
comment
0 Comments
access_time
5 min read
Physical Security: Apple macOS Mojave screen lock glitch leaking the secrets behind it!
Mohamed A. Baset
on February 4, 2019
comment
0 Comments
access_time
5 min read
Fitbit – APIs and Access Control Failures, a simple API bug allowed to harvest millions of user private activities!
Mohamed A. Baset
on February 1, 2019
comment
0 Comments
access_time
2 min read
Google Drive: Bad implemented Logic leads to trivial bypass of any "Large File Download Quota Limits"!
Mohamed A. Baset
on January 31, 2019
comment
0 Comments
access_time
2 min read
تطبيقات الفدية الخبيثة "رانسوموير" إحصائيات ونقاش ومعلومات وحلول
Mohamed A. Baset
on January 7, 2019
comment
0 Comments
access_time
4 min read
Trick or threat:
De la confianza al sexting, la extorsión y el ciberacoso.
Hiram Camarillo
on November 20, 2018
comment
0 Comments
access_time
1 min read
PAYFORT - Multiple Security Issues and Concerns in a PCI/DSS compliant payment processor SDK!
Mohamed A. Baset
on November 13, 2018
comment
0 Comments
access_time
14 min read
تحقيق وتحليل تقنى: جريدة الاهرام النسخة الانجليزية تقوم بإستخدام اجهزة الزوار لتعدين عملات رقمية بتكنيك مختلف وجديد!
Mohamed A. Baset
on November 10, 2018
comment
0 Comments
access_time
1 min read
تحقيقات: مجرم و ايفون و راسبرى باى
Mohamed A. Baset
on November 6, 2018
comment
0 Comments
access_time
3 min read
CryptoJacking by Clickjacking: Bypassing Coinhive OPT-IN feature and trick users into Cryptocurrency mining!
Mohamed A. Baset
on October 21, 2018
comment
0 Comments
access_time
3 min read
Hak5 C2 (Cloud Command and Control) Self-hosted Server ClickJacking Vulnerability
Mohamed A. Baset
on October 19, 2018
comment
0 Comments
access_time
3 min read
Campaña de extorsión sexual: Su cuenta (
[email protected]
) fue pirateada
Hiram Camarillo
on September 25, 2018
comment
0 Comments
access_time
4 min read
United Nations (UN) - A tail of leaking thousands of Job Applicants CVs and documents online, Path Disclosure and Information Disclosure Vulnerabilities!
Mohamed A. Baset
on September 24, 2018
comment
0 Comments
access_time
4 min read
Business Logic Vulnerabilities Series: A Story of a 4-Years-old (and counting) Facebook Security Bug!
Ali Kabeel
on July 26, 2018
comment
0 Comments
access_time
4 min read
La CNBV expone públicamente información sensible de 1,700 usuarios, documentos e información interna.
Hiram Camarillo
on June 22, 2018
comment
0 Comments
access_time
2 min read
Criptojacking en sitios del Gobierno de Chihuahua, Estado de México, El Economista y HIR Casa.
Hiram Camarillo
on May 8, 2018
comment
0 Comments
access_time
5 min read
Previous page
Next page
Translate this blog
Scroll Up