XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser
+91 86086 34123
Stay Connected:
XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser
We find IoT in a wide range of applications, including smart cities, control actuation and maintenance of complex systems in industry health, transport and much more
Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.
There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .
Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military
We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.
RFID is a device which works basically on the electromagnetic waves. Its operating frequency varies from 135KHz - 5.8GHZ and these are closely coupled circuits.
Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...
The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.
Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.
We will all be familiar with the attack surfaces in web,mobile,network and cloud technologies but haven’t you heard about the hardware
Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.
RF remote controllers are used in most of the devices varying from remote control toy cars to heavy equipment’s used in mining operations and factory floor.
Controller Area Network (CAN) is the widely used In-vehicle networking. When seen from a normal point of view, CAN is really powerful in transmitting all the critical and non-critical
Web Service is a software service used to create a communication between 2 devices connected over a network through internet.
A Chat-bot is more like an Artificial Intelligence (AI) program which is used to setup a conversation with the end user (human) in a preprogrammed human language
Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.
SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL
Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application
In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.
An Organization can protect their digital assets, which are production systems, servers; several network devices and so on, by implementing firewalls