Skip to content
career
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Company
  • Services
    • Web Security
    • Mobile Security
    • Cloud Security
    • API Security
    • Bug Bounty
  • News & Updates
Contact Us
Contact Us
Free Website Scanner
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Services

Content Sniffing

Leave a Comment / Cyber Security / Weborion

Content Sniffing also knew as “Media Type Sniffing” or “Multipurpose Internet Mail Extensions (MIME) Sniffing”.

Content Sniffing Read More »

Root Kit -The Undetectable Malware

2 Comments / Cryptography, cryptojacking, Cyber Attack, Cyber Security, Defense Military, Web Security / Weborion

A rootkit is one of the most difficult types of malware to find and remove.  Malicious hackers frequently use them to eavesdrop on your PC, such as key loggers, or to remotely control your computer, in case of botnets or similar threats.

Root Kit -The Undetectable Malware Read More »

Piggybacking

Leave a Comment / Cryptography, Cyber Attack, Mobile Security, Web Security / Weborion

In two-way communication, wherever a frame is received, the receiver waits and does not send the control frame (acknowledgment or ACK) back to the sender immediately. The receiver waits until its network layer passes in the next data packet. The delayed acknowledgment is then attached to this outgoing data frame. This technique of temporarily delaying the

Piggybacking Read More »

Cyber Security Threats and How it Prevent

Leave a Comment / Cyber Security / Weborion

Cyber Security Threats, the possibility of a malicious attempt to damage or disrupt a computer network or system and to access files and infiltrate or steal data.

Cyber Security Threats and How it Prevent Read More »

CRONJOB BACKDOOR

1 Comment / Cyber Security / Weborion

The software utility Cron is a time-based job scheduler in Unix-like computer operating systems. Users that set up and maintain software environments use Cron to schedule jobs (commands or shell scripts) to run periodically at fixed times, dates,

CRONJOB BACKDOOR Read More »

Post pagination
← Previous 1 … 56 57 58 … 83 Next →

Cybersecurity

Helping Clients Stay Secure By Ethically Hacking Them Well Before Malicious Hackers Do.

Services

  • Cloud Security
  • Web App Pentest
  • Mobile App Pentest
  • API Pentest
  • Bug Bounty

Quick Links

  • Services
  • Defensive
  • News & Updates
  • career
  • Contact

Contact Info

325, Sun Gravitas Nr, Shyamal Cross Rd, Rajmani Society, Shyamal, Ahmedabad, Gujarat 380015

© 2025 Weborion Innovation Pvt Ltd

Digital Marketing Partner Real Rank Riser