Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
23rd September 2021

Why CIS Harden images should be matters for better security?

CIS Benchmarks are frameworks for calibrating a range of IT services and products to ensure the highest standards of cybersecurity. They’re developed through a collaborative process with input from experts within the cybersecurity community

23rd September 2021

CIS Benchmarks are frameworks for calibrating a range of IT services and products to ensure the highest standards of cybersecurity

Enterprises have been able to achieve new digital heights thanks to the public cloud, which has enabled them to establish dynamic and scalable operations

16th September 2021

HOW CAN THE OWASP DEPENDENCY TRACKER BE USED TO IMPROVE THE APPLICATION SECURITY LIFECYCLE?

Dependency Track is a free, open-source continuous component analysis platform that helps businesses discover and mitigate supply chain risk

23rd September 2021

What is the Difference Between AWS Vs Azure Vs Google from a Cloud Security Standpoint

These services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware

8th October 2018 341

Critical Corporate Cyber Security Risks-A Data-Driven List

It is a well-known fact that most of the corporate organisations have been the target of black-hat hackers and hacktivist groups, and they were experiencing data breaches, server compromise etc.

9th July 2019 758

Patch Management

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

10th August 2021

End to End Email Security with DMARC Records

DMARC also known as Domain Message Authentication, Reporting & Conformance is a technical standard that helps protect email senders and receipients from email related spoofing and phishing attacks

6th November 2019 336

Cloud Security And The Best Ways To Secure It From Breaches

In this digital era, organizations are building their infrastructures and running their services in the cloud environment.

6th November 2019 686

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

12th August 2019 1314

Layer Wise Analysis of Security in IOT

We find IoT in a wide range of applications, including smart cities, control actuation and maintenance of complex systems in industry health, transport and much more

11th October 2018 2325

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

9th October 2018 335

PCI-DSS_3.2 - 2018 Changes

The Payment Card Industry Data Security Standard (PCI DSS) was developed to follow the policy and standards of cardholder data security which consistent data security measures globally

6th November 2019 1202

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

27th April 2020 560

Why large organizations suffer frequent cyber-attacks than smaller ones?

We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.

6th October 2018 919

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

9th July 2019 355

Remediation Verification Penetration Test

When organisations are performing penetration testing or secure code review, they will get a number of vulnerabilities to be remediated and will start fixing those during the next assessment.

27th May 2019 456

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

28th May 2019 3204

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

11th November 2019 696

Why You Might Be Failing at the Hardware Attack

Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

30th January 2019 575

What you should know before you Pick Secure Code Review services

Secure Code Review service is the process that comes into the development phase. It is used to detect all types of inconsistencies and flaws in various areas of authentication, authorization, security configuration, session management, logging, data validation, error handling, and encryption.

14th March 2019 580

Drupal Core Remote Code Execution Vulnerability: CVE-2019-6340

Drupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.