Skip to main content



Intro to RCEs: What they are and how to prevent them
·3 mins· 0 · 0
Hacking RCE
An RCE (Remote Code Execution) allows the attacker to execute malicious code on a remote server if, for example, you have a website with a vulnerable parameter in the url. Discover more about RCEs and how to prevent them in this article!
Subdomain Takeover: how an atacker can take control of your website
·3 mins· 0 · 0
Hacking Vuln
Computer attacks are increasingly sophisticated and, in many cases, they can go unnoticed for a long time. One of these types of attacks is subdomain takeover, in which an attacker can take control of a subdomain of a website and use it for its own malicious purposes.