Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
27th May 2021 336

Cloud Security And The Best Ways To Secure It From Breaches

In this digital era, organizations are building their infrastructures and running their services in the cloud environment.

24th May 2021 686

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

12th May 2021 1314

Layer Wise Analysis of Security in IOT

We find IoT in a wide range of applications, including smart cities, control actuation and maintenance of complex systems in industry health, transport and much more

12th May 2021 2325

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

12th May 2021 335

PCI-DSS_3.2 - 2018 Changes

The Payment Card Industry Data Security Standard (PCI DSS) was developed to follow the policy and standards of cardholder data security which consistent data security measures globally

12th May 2021 1202

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

12th May 2021 560

Why large organizations suffer frequent cyber-attacks than smaller ones?

We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.

12th May 2021 919

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

12th May 2021 341

Critical Corporate Cyber Security Risks-A Data-Driven List

It is a well-known fact that most of the corporate organisations have been the target of black-hat hackers and hacktivist groups, and they were experiencing data breaches, server compromise etc.

12th May 2021 355

Remediation Verification Penetration Test

When organisations are performing penetration testing or secure code review, they will get a number of vulnerabilities to be remediated and will start fixing those during the next assessment.

12th May 2021 456

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

12th May 2021 3204

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

12th May 2021 696

Why You Might Be Failing at the Hardware Attack

Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

12th May 2021 575

What you should know before you Pick Secure Code Review services

Secure Code Review service is the process that comes into the development phase. It is used to detect all types of inconsistencies and flaws in various areas of authentication, authorization, security configuration, session management, logging, data validation, error handling, and encryption.

12th May 2021 580

Drupal Core Remote Code Execution Vulnerability: CVE-2019-6340

Drupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.

10th May 2021 403

SIEM Integration

SIEM Integration is a comprehensive solution for capturing, retention, and delivery of security information and events, in real-time to SIEM applications.

10th May 2021 1328

Techniques to Secure your SOAP and REST API

An API is called as Application Programming Interface which is used for communication. An API acts as a middle man who delivers your request to the provider and then delivers response to

10th May 2021 2145

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

10th May 2021 460

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

10th May 2021 322

Security and Privacy in IoT

In todays world, each and every device is metamorphosing into digital and all these devices are being connected with other devices for aiding mankind.

2nd March 2021 778

Beware of NetWire RAT Malware spread via Microsoft Excel 4.0 Macro

Excel is a spreadsheet developed by Microsoft that features calculation, graphing tools and macro program language