Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
30th May 2019 493

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

12th August 2019 595

Layer Wise Analysis of Security in IOT

We find IoT in a wide range of applications, including smart cities, control actuation and maintenance of complex systems in industry health, transport and much more

3rd October 2018 13988

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

6th November 2019 256

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

31st July 2019 334

The security and privacy risks of face recognition authentication

Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military

27th April 2020 224

Why large organizations suffer frequent cyber-attacks than smaller ones?

We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.

10th March 2020 334

Security Challenges In RFID : It is Not as Difficult as You Think

RFID is a device which works basically on the electromagnetic waves. Its operating frequency varies from 135KHz - 5.8GHZ and these are closely coupled circuits.

18th January 2019 288

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

9th July 2019 313

Patch Management

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

11th November 2019 299

Why You Might Be Failing at the Hardware Attack

Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

7th April 2020 229

Dumpster Diving-Your Unused Modem Hardware can Leak Your Critical Data

We will all be familiar with the attack surfaces in web,mobile,network and cloud technologies but haven’t you heard about the hardware

4th May 2019 5778

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

6th August 2019 396

How your RF layer is exposed to serious cyberattacks?

RF remote controllers are used in most of the devices varying from remote control toy cars to heavy equipment’s used in mining operations and factory floor.

20th August 2019 464

Troubling Security issues in Controller Area Network

Controller Area Network (CAN) is the widely used In-vehicle networking. When seen from a normal point of view, CAN is really powerful in transmitting all the critical and non-critical

20th August 2019 476

Guidelines to Secure Web Services and API End-Points

Web Service is a software service used to create a communication between 2 devices connected over a network through internet.

11th February 2019 341

Chat-Bot Security: Secure or A Way for Intruder

A Chat-bot is more like an Artificial Intelligence (AI) program which is used to setup a conversation with the end user (human) in a preprogrammed human language

6th October 2018 550

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

8th October 2018 3310

SQL Injection -Using Burp Suite

SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL

11th October 2018 1586

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

9th May 2019 1313

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

4th June 2020 179

Best of IT defenses cannot protect you

An Organization can protect their digital assets, which are production systems, servers; several network devices and so on, by implementing firewalls