Gain hands-on skills with expert-led courses designed to prepare you for the global tech industry. Start your professional journey today.
Explore Courses Join Now
Access top-tier IT certifications and professional skill development from the comfort of your home. Learn from the best instructors in the AFG.
Explore Courses Join Now
Welcome to a place where dreams take flight and knowledge knows no bounds. Embrace the journey, dear students.
Step into the halls of wisdom, where each welcome is a promise of growth and every challenge is an opportunity to shine.
Skilled Instructors
Online Classes
International Certificate
Share your knowledge and expertise with students worldwide. Join our community of educators and make a difference in online learning.
Flexible Teaching
Global Reach
Competitive Compensation
Professional Development
آکادمی سینا در نظر دارد جهت ارتقای ظرفیتهای هنری و مهارتهای دیجیتال دانشآموزان، یک دوره آموزشی ویژه و کاملاً رایگان را تحت عنوان «آموزش فتوشاپ در ۱۰ روز» برگزار نماید. ویژگیهای این پروگرام آموزشی: هزینه: کاملاً رایگان (بدون اخذ هیچگونه فیس). مدت برنامه: ۱۰ روز آموزشی فشرده. سطح آموزش: تمرکز ویژه بر ویرایش پیشرفته (Advanced) عکسها. شرایط اشتراک: این دوره هیچ پیشنیازی ندارد و تمامی دانشآموزان و علاقهمندان میتوانند اشتراک کنند. اگر میخواهید مهارتهای ویرایش عکس را از سطح ابتدایی تا حرفهای بیاموزید، این فرصت طلایی را از دست ندهید. برای ثبت نام وارد لینک ذیل شده فورم تکمیل کنید. https://www.sinaacademy.co.uk/en/enrolling/student/
As a security researcher, one of the most satisfying finds is a zero-click vulnerability something that executes malicious code the moment a victim loads the page, with no interaction required. Recently, I discovered exactly that: a reflected Cross-Site Scripting (XSS) vulnerability in the search functionality of a public-facing WordPress site. This wasn’t a stored XSS that persists forever, but a reflected one delivered via a crafted URL. What made it dangerous? The proof-of-concept (PoC) triggered JavaScript execution instantly on page load, turning a simple shared link into a potential phishing or session hijacking vector. In this write-up, I’ll break down the vulnerability, the payload, why it worked, the impact, and most importantly how developers can prevent it. (The issue was reported responsibly, deemed out-of-scope for the program’s bounty due to it being on the marketing site, but appears to have been fixed shortly after.) The Vulnerability: Attribute Breakout in the Search Input WordPress sites commonly use the ?s= parameter for search queries (e.g., / ?s=keyword). Themes often repopulate the search box on the results page like this: <input type="search" name="s" value="<?php echo $_GET['s']; ?>"> If the input isn’t properly escaped for HTML attributes (using something like esc_attr() in PHP), an attacker can break out of the value attribute and inject new ones. Many sinks escape text content (like the <h1>Results for “…` heading), but forget the input field itself a classic oversight. The Payload: Zero-Click Execution with autofocus + onfocus ?s=" autofocus onfocus=alert(1) x=" Press enter or click to view image in full size Pwned !!! Here’s how it breaks down: The “ closes the value attribute prematurely. autofocus — a valid HTML attribute that forces the browser to focus the input on page load. onfocus=alert(1) — an event handler that fires when the input gains focus. x=” — a dummy attribute to balance the syntax and prevent rendering errors. Resulting injected HTML: <input type="search" value="" autofocus onfocus="alert(1)" x=""> Boom: Page loads → input auto-focuses → onfocus triggers → alert(1) pops instantly. Become a member No clicks, no hovers pure zero-click. Impact: Why This Matters Arbitrary JS execution in the site’s origin. Easy social engineering: “Hey, check this search result on [site]” → victim clicks link → code runs. Potential for: Stealing non-HttpOnly cookies/sessions. Phishing overlays. Keylogging. Defacement (visual changes). Even on a marketing site, it erodes trust and could target partners/customers. Reflected XSS is often underrated, but zero-click variants elevate it to high severity. Timeline & Responsible Disclosure Discovered and PoC’d with screenshot evidence. Reported via the company’s bug bounty platform. Triaged as High severity but out-of-scope (program focuses on core product, excludes WordPress marketing site and standard WP issues). No bounty, but that’s fine safety first. Final Thoughts Finding executable XSS never gets old especially zero-click ones that feel like magic. Shoutout to the team for the quick (implicit) fix and running a program. If you’re hunting WordPress sites, check those search fields! Happy hunting !
Dear Students and Professionals, We are proud to announce that Sina Academy, in its unwavering commitment to protecting the authenticity of our credentials and aligning with global benchmarks, has successfully implemented a comprehensive suite of ISO (International Organization for Standardization) standards into our certification process. From now on, all certificates issued by Sina Academy will feature the following world-class enhancements: Premium Security: Utilizing ISO/IEC 19790 cryptographic protocols to ensure your certificates are tamper-proof and fully protected against forgery. Content Excellence: All courses are now structured according to the ISO/IEC 12785 educational IT standard, ensuring global interoperability and curriculum quality. Data Transparency: Full educational metadata is recorded following the ISO/IEC 5962 (SPDX) global standard, providing a transparent and verifiable record of your achievements. Quality Management: Our services are guaranteed under ISO 9001:2015, including the latest Amd 1 sustainability and climate action framework. This achievement significantly boosts the value of your credentials in the international job market and provides employers with a reliable, high-tech method for verification. Sina Academy: Leading the way in standardized and prestigious education.
Unlock your potential and shape your future at Sina Academy, where innovation meets education! Our comprehensive programs offer students the opportunity to explore cutting-edge fields like Cyber Security, Web Engineering, Software Engineering, Programming Languages, and Artificial Intelligence. Why Choose Us? Expert Instructors: Learn from industry professionals with real-world experience and a passion for teaching. Hands-On Learning: Engage in practical projects, workshops, and collaborative work that prepare you for the challenges of the tech industry. Cutting-Edge Curriculum: Our courses are designed to keep you ahead in a rapidly evolving landscape, covering the latest tools, technologies, and methodologies. Diverse Learning Environment: Connect with like-minded peers and industry experts in a collaborative and inspiring atmosphere. Career Support: Benefit from our robust career services, including internships, job placements, and resume workshops, to kickstart your career in technology. Our Programs Cyber Security: Protect systems and networks from cyber threats, learn about ethical hacking, and master the tools of the trade. Web Engineering: Develop interactive, user-friendly websites and applications with modern design principles and coding languages. Software Engineering: Gain a thorough understanding of software development life cycles, methodologies, and best practices. Programming Languages: Master languages like Python, Java, C++, and more to become a versatile programmer. Artificial Intelligence: Dive into machine learning, deep learning, and AI applications across various industries. Don't miss the chance to join a community dedicated to innovation and excellence in technology. Enroll now at Sina Academy and take the first step toward a successful career in the tech world!
As 2025 nears its close, the cybersecurity landscape shows no signs of slowing down. This week’s developments highlight how rapidly the threat environment continues to evolve with major zero-day vulnerabilities targeting Windows, Chrome, and Apple devices, each actively exploited in the wild. These high-risk flaws underline the continued importance of swift patching, layered defense, and continuous threat monitoring across enterprise ecosystems. Meanwhile, offensive security professionals received a major update as Kali Linux 2025.4 rolled out with new tools, kernel upgrades, and enhanced cloud integration, reinforcing its position as a cornerstone for penetration testing and digital forensics in both research and operational security settings. On the defensive front, MITRE released its annual Top 25 Most Dangerous Software Weaknesses of 2025, spotlighting recurring coding errors that adversaries frequently weaponize. From inadequate input validation to risky resource management, the list serves as a vital reminder that secure coding is still the first line of defense against complex exploitation techniques and chained attack vectors. Across the board, this week reflects a convergence of aggressive exploitation activity and heightened community response. Organizations are urged to prioritize visibility, validate software supply chains, and stay aligned with evolving security frameworks. Whether patching systems affected by 0-days, assessing exposure through MITRE’s latest findings, or adopting the latest features of Kali Linux, the takeaway is clear — cyber resilience depends on agility, awareness, and readiness. Stay ahead of the threat curve with this week’s highlights, advisories, and actionable updates across infrastructure, endpoint, and application security domains.
Cybersecurity researchers have uncovered a sophisticated email campaign deploying a commodity loader to distribute Remote Access Trojans and information stealers. The operation primarily targets manufacturing and government organizations across Italy, Finland, and Saudi Arabia, using highly evasive techniques. Multi-Vector Attack Strategy The campaign employs multiple infection methods to compromise Windows systems. Threat actors are distributing weaponized Microsoft Office documents that exploit CVE-2017-11882, a critical memory corruption vulnerability in the Equation Editor component. Additionally, attackers leverage malicious SVG files and ZIP archives containing LNK shortcuts, all converging on a unified commodity loader infrastructure. The attacks begin with targeted phishing emails masquerading as legitimate Purchase Order communications from business partners. These deceptive messages contain RAR archives hiding first-stage JavaScript payloads designed to bypass initial security screening. The malware operates through a sophisticated four-stage execution pipeline engineered to evade detection. The initial JavaScript file contains heavily obfuscated code that dynamically reconstructs malicious strings using split and join operations. Upon execution, it creates a hidden PowerShell process using Windows Management Instrumentation objects. The second stage retrieves a malicious PNG image from legitimate hosting services such as Archive.org. This image contains steganographically embedded base64-encoded .NET assemblies hidden at the end of the file. The PowerShell script extracts this payload using a regular expression. It loads it directly into memory without writing to disk. In the third stage, attackers weaponize the legitimate open-source TaskScheduler library from GitHub. By appending malicious functions to the source code and recompiling it, they create a trojanized assembly that retains an authentic appearance while embedding malicious capabilities. The final stage employs process injection techniques, creating a suspended RegAsm.exe process and injecting the decoded payload into its memory space. This process hollowing allows malware to masquerade as legitimate Windows utilities while executing malicious code. Payload Delivery and Capabilities The campaign delivers various information-stealing tools and RATs, including PureLog Stealer, Katz Stealer, DC Rat, Async Rat, and Remcos. The PureLog Stealer payload is decrypted using Triple DES encryption in CBC mode before being invoked to exfiltrate sensitive data, including browser credentials, cryptocurrency wallet information, and comprehensive system details. Researchers at Cyble Research and Intelligence Labs (CRIL) identified a novel User Account Control (UAC) bypass technique in which malware monitors system process-creation events and opportunistically triggers UAC prompts during legitimate launches, tricking users into granting elevated privileges. Cross-campaign analysis reveals standardized methodology across multiple threat actors, suggesting the loader operates as a shared delivery framework. Research from Seqrite, Nextron Systems, and Zscaler documented identical class naming conventions and execution patterns across various malware families, confirming the widespread availability of this infrastructure. Organizations should implement enhanced email filtering, disable legacy Office equation editor components, scrutinize image attachments, and monitor for suspicious PowerShell activity to mitigate these sophisticated threats.
Tonight, the longest night of the year, is an opportunity to be together and celebrate love and friendship. Let's fill this special night with the light of our hearts and welcome a new season. Every pomegranate seed and watermelon slice symbolizes the wonders of life and hope for brighter days ahead. Let's revive sweet memories with stories and poems of Hafez, and plant joy in our hearts. May our hearts be filled with hope and happiness at dawn on Yalda, and may the new year be full of blessings and fulfilled wishes for all of you. May your Yalda be full of light and joy!
SINA Academy, the premier online college dedicated to advanced technology and computer science studies, proudly announces its official membership into the prestigious Global School Alliance (GSA). This significant achievement marks SINA Academy's commitment to adhering to international standards of educational quality and expanding its influence across the global academic landscape. The Global School Alliance is an influential international network that connects educational institutions dedicated to excellence, collaboration, and improving student outcomes worldwide. Elevating Global Standards The GSA membership provides SINA Academy with unparalleled access to international educational leaders, resources, and continuous professional development, ensuring that SINA's curriculum remains on the cutting edge of global technological demands. “Joining the Global School Alliance is a key strategic milestone for SINA Academy,” said [Name and Title of SINA Academy Leader, e.g., CEO/Director of Academics]. “It is a public commitment that our rigorous, project-based programs—from Cybersecurity to Artificial Intelligence—are benchmarked against the highest international standards. This affiliation directly enhances the global recognition and value of every certificate and qualification our students earn.” Benefits for SINA Academy Students For current and future SINA Academy students, this membership translates directly into an enhanced educational experience and increased career opportunities: Global Recognition: Affiliation with the GSA reinforces the credibility of SINA Academy’s certifications, making graduates more competitive in international job markets. Best Practices in Pedagogy: SINA Academy will leverage GSA partnerships to continuously refine its online learning models and integrate the latest and most effective teaching methodologies. Networking and Collaboration: Opportunities may arise for student and faculty participation in international collaborative projects and virtual exchange programs facilitated by the Alliance network. Commitment to the Future SINA Academy’s online model has always been focused on breaking down geographical barriers to high-quality education. The GSA membership solidifies this vision, positioning the academy as a trusted partner in preparing a globally ready, skilled technology workforce. We look forward to actively contributing to the Alliance's mission and furthering the cause of inclusive, high-quality digital education worldwide. SINA Academy offers specialized, fully online programs in Software Engineering, Cybersecurity, Data Science, Networking & Cloud Computing, Artificial Intelligence, and Web Engineering. Explore our programs and start your journey to a global tech career today.
More than 10,000 Docker Hub container images expose data that should be protected, including live credentials to production systems, CI/CD databases, or LLM model keys. The secrets impact a little over 100 organizations, among them are a Fortune 500 company and a major national bank. Docker Hub is the largest container registry where developers upload, host, share, and distribute ready-to-use Docker images that contain everything necessary to run an application. Developers typically use Docker images to streamline the entire software development and deployment lifecycle. However, as past studies have shown, carelessness in creating these images can result in exposing secrets that remain valid for extended periods. After scanning container images uploaded to Docker Hub in November, security researchers at threat intelligence company Flare found that 10,456 of them exposed one or more keys. The most frequent secrets were access tokens for various AI models (OpenAI, HuggingFace, Anthropic, Gemini, Groq). In total, the researchers found 4,000 such keys. When examining the scanned images, the researchers discovered that 42% of them exposed at least five sensitive values. "These multi-secret exposures represent critical risks, as they often provide full access to cloud environments, Git repositories, CI/CD systems, payment integrations, and other core infrastructure components," Flare notes in a report today. Analyzing 205 namespaces enabled the researchers to identify a total of 101 companies, mostly small and medium-sized businesses, with a few large enterprises being present in the dataset. Based on the analysis, most of the organizations with exposed secrets are in the software development sector, followed by entities in the market and industrial, and AI and intelligent systems. More than 10 finance and banking companies had their sensitive data exposed. According to the researchers, one of the most frequent errors observed was the use of .ENV files that developers use to store database credentials, cloud access keys, tokens, and various authentication data for a project. Additionally, they found hardcoded API tokens for AI services being hardcoded in Python application files, config.json files, YAML configs, GitHub tokens, and credentials for multiple internal environments. Some of the sensitive data was present in the manifest of Docker images, a file that provides details about the image. Many of the leaks appear to originate from the so-called 'shadow IT' accounts, which are Docker Hub accounts that fall outside of the stricter corporate monitoring mechanisms, such as those for personal use or belonging to contractors. Flare notes that roughly 25% of developers who accidentally exposed secrets on Docker Hub realized the mistake and removed the leaked secret from the container or manifest file within 48 hours. However, in 75% of these cases, the leaked key was not revoked, meaning that anyone who stole it during the exposure period could still use it later to mount attacks. Flare suggests that developers avoid storing secrets in container images, stop using static, long-lived credentials, and centralize their secrets management using a dedicated vault or secrets manager. Organizations should implement active scanning across the entire software development life cycle and revoke exposed secrets and invalidate old sessions immediately.
Industry-recognized certifications and quality standards