Skip to content
career
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Company
  • Services
    • Web Security
    • Mobile Security
    • Cloud Security
    • API Security
    • Bug Bounty
  • News & Updates
Contact Us
Contact Us
Free Website Scanner
WebOrion™ Cyber Security and Vulnerability Assessment Services
  • Services

Hiddenwasp: Undetected malware attacks on Linux Systems

Leave a Comment / Cyber Security / Weborion

A new sophisticated, Unique Linux malware dubbed hiddenwasp used in targeted attacks against victim’s who are already under attack or gone through a heavy reconnaissance.

Hiddenwasp: Undetected malware attacks on Linux Systems Read More »

Content Sniffing

Leave a Comment / Cyber Security / Weborion

Content Sniffing also knew as “Media Type Sniffing” or “Multipurpose Internet Mail Extensions (MIME) Sniffing”.

Content Sniffing Read More »

Root Kit -The Undetectable Malware

3 Comments / Cryptography, cryptojacking, Cyber Attack, Cyber Security, Defense Military, Web Security / Weborion

A rootkit is one of the most difficult types of malware to find and remove.  Malicious hackers frequently use them to eavesdrop on your PC, such as key loggers, or to remotely control your computer, in case of botnets or similar threats.

Root Kit -The Undetectable Malware Read More »

Piggybacking

Leave a Comment / Cryptography, Cyber Attack, Mobile Security, Web Security / Weborion

In two-way communication, wherever a frame is received, the receiver waits and does not send the control frame (acknowledgment or ACK) back to the sender immediately. The receiver waits until its network layer passes in the next data packet. The delayed acknowledgment is then attached to this outgoing data frame. This technique of temporarily delaying the

Piggybacking Read More »

Cyber Security Threats and How it Prevent

Leave a Comment / Cyber Security / Weborion

Cyber Security Threats, the possibility of a malicious attempt to damage or disrupt a computer network or system and to access files and infiltrate or steal data.

Cyber Security Threats and How it Prevent Read More »

Post pagination
← Previous 1 … 56 57 58 … 83 Next →

Cybersecurity

Helping Clients Stay Secure By Ethically Hacking Them Well Before Malicious Hackers Do.

Services

  • Cloud Security
  • Web App Pentest
  • Mobile App Pentest
  • API Pentest
  • Bug Bounty

Quick Links

  • Services
  • Defensive
  • News & Updates
  • career
  • Contact

Contact Info

325, Sun Gravitas Nr, Shyamal Cross Rd, Rajmani Society, Shyamal, Ahmedabad, Gujarat 380015

© 2026 Weborion Innovation Pvt Ltd

Digital Marketing Partner Real Rank Riser