Cymetrics Tech Blog

From Start to Finish:A Deep Dive into How Cymetrics Manages Product Development Process

When facing rapidly evolving customer segments and opportunities, continuously identifying sweet spots is one of the goals of a product manager, while the goal of a project manager is to ensure smooth delivery of these products, projects, and features to end users. To achieve these objectives, it is essential to establish a product development process that facilitates seamless and timely product operations, from conceptualization, design, development, to delivery. Specifically, Cymetrics breaks down the overall process into the following parts:Requirement processDesign processDevelopment process

ChatGPT Hacking Basics

ChatGPT is incredibly easy to use, but its development team at OpenAI has restricted many answers related to security issues in order to prevent hackers from using ChatGPT for attacks. As a result, finding correct answers without crossing the line has become a new research topic for hackers and cybersecurity experts.The purpose of this article is to share some methods for obtaining answers from ChatGPT, which can be broadly classified into two categories: those that can be exploited by attackers and those that developers need to use for protection. While the implementation in the article is based on websites, these methods are not limited to website attacks and can be useful in various other areas of cybersecurity.

What is Supply Chain Attack?

What is a supply chain attack and where does it occur? What can we do to prevent it? Let's take a look at the possible attacks in the development process or what are the possible links to be attacked by the supply chain through real-life examples.

The five key factors that hinder SMBs from excellent cybersecurity

As small and medium-sized enterprises (SMEs) begin to embrace digital transformation, the lack of cybersecurity information for SMEs has become the best target for hackers. According to CISCO's Cybersecurity for SMBs:Asia Pacific Businesses Prepare for Digital Defense report, 56% of SMEs in the Asia-Pacific region (APJC) have experienced cyber security incidents in the past 12 months

How to Choose a Safe Exchange

Exchanges can be seen as the core of Web 3.0 centralized services, but in recent years, more and more cybersecurity incidents are surrounding exchanges. Therefore, it has become very important to find more scientific ways to choose exchanges instead of relying on own instincts.

Basic Awareness of Hacking Prevention: Data Protection

It’s very time-consuming for hackers to collect and sort out useful information from the attacks. If they couldn’t turn those data into money, they will probably starve to death. Therefore, this article uses some common examples to illustrate how hackers can take advantage of the data leakage and the corresponding impacts from a profit-making perspective.

Basic Awareness of Hacking Prevention:Backup and Restore

Suppose your house is burglarized today, as having superpower, you rewind time to yesterday, but if you didn’t make any changes, the same thing will happen again. You should take the opportunity to change the locks or hide the money somewhere else.

SSRF and Account Takeover via XSS in ERPNext (0-day)

ERPNext is a very popular open-source ERP(Enterprise Resource Planning) software built on Frappe Framework.Last December, we found two vulnerabilities in the latest version of ERPNext: SSRF(Server-Side Request Forgery) and account takeover via XSS. Both vulnerabilities require a low-privileged authenticated user to perform the attack.