Cybersecurity Blog
Read Hackdra’s cybersecurity blog to learn strategies to strengthen your attack resistance with the help of highly skilled ethical hackers. Improve your security profile and stay up-to-date on industry trends and emerging threats.
Featured Posts

Medibank Hacking Led to Sanctions Against Russia
In late 2022, the personal information of 9.7 million Australians was stolen from Medibank, the country’s largest health insurance company. Sensitive documents, including abortion records, were then published online. The cyber sanctions, the first of their kind in Australia, include...

How to catch injection vulnerabilities in code review?
As applications process untrusted data, injection flaws endanger systems. During development, close inspection guards against these prevalent risks. This guide outlines a methodical review process for developers to identify and fix vulnerabilities. Understanding the Injection Threat Injection attacks occur when...

ChatGPT Leaks Sensitive User Data
Concerns about the security and privacy of productive AI tools have increased following reports of leaked conversations through OpenAI’s ChatGPT. The incident has raised questions about vulnerabilities in AI systems, despite companies’ efforts to build security measures. Sensitive data, including...

Understanding the Importance of KYC
As the use of digital finance grows, so too does the need to verify customers. KYC (Know Your Customer) procedures play a key role in protecting integrity and preventing crime. This comprehensive guide explains common KYC practices and their...

International Cooperation in Combating Cybersecurity Threats
Cybersecurity threats have become a global problem that requires coordinated international efforts to effectively tackle. As attacks become more advanced and sophisticated, no single government or organization has the capabilities to deal with these challenges alone. Close collaboration between...

Proactive Vulnerability Management Protects Against Cyber Threats
As technology continues to evolve at a rapid pace, cybersecurity risks faced by businesses likewise continue to grow more advanced and complex. In today’s digital landscape, proactive vulnerability management is a business imperative for any organization seeking to safeguard...

State-sponsored Cloudflare Attack
Web security company Cloudflare on Thursday revealed that a threat actor used stolen credentials to gain access to some of its internal systems. The threat actor, believed to be state-sponsored, was discovered on November 23, nine days after the actor...

SMTP Trafficking: Your Security at Risk
The new exploitation technique known as Simple Mail Transfer Protocol (SMTP) smuggling enables threat actors to send fake emails with fake sender addresses. SMTP is a TCP/IP protocol used for email exchange. An SMTP connection is established between the client...

The Leading Cybersecurity Agency in The United States was Attacked
US officials discovered last month that a federal agency responsible for cybersecurity was hacked and had to take two important computer systems offline. According to US officials briefed on the matter, the affected systems of the US Cybersecurity and Infrastructure...