0 0
Read Time:33 Second

This website, which uses the WordPress content management system, may inadvertently allow hackers / attackers to use its credentials and URL for purposes such as phishing or ….
At the following address, there is a parameter in the URL that can lead the visitor to the attacker site due to not paying attention to security points:


http://old.kut.ac.ir/?wptouch_switch=desktop&redirect= {Hacker Refer Website}

The visitor, who usually pays attention to the beginning of the address, thinks that he will enter the university website, which will be redirected to the hacker’s desired website.
This website was registered by a hacker named h4shur Defis a few hours ago.

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence