Briskinfosec - Global Cybersecurity Service Providers

  • +91 86086 34123

  • contact@briskinfosec.com

Stay Connected:

The Best CyberSecurity Blogs to Know | Briskinfosec
Image

SSRF-Server Side Request Forgery

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a crafted request from a vulnerable web application

Image

DevSecOps in the age of the cloud

In DevOps, the application is often releasing new features and functionalities. In every release, the business needs are deployed in the cloud for flexibility and service delivery but often they are skipping the information security service in completing the organisation’s on-time release

Image

The End of Passive Trust

A data breach is a confirmed incident when a sensitive, confidential or otherwise protected data has been accessed and disclosed in an unauthorised fashion.

Image

Sparta

Sparta is a Python based GUI application and it’s a network infrastructure pentesting tool by aiding the pentesters in performing scanning and enumeration phase

Image

NIST Cyber security Framework

The Framework offers an agile way to address cybersecurity, including cybersecurity’s effect on physical, cyber, and people dimensions. It applies to organisations relying on technology

Image

From tech-to business-driven security

In today’s digital world, IT security strategy must be transformed into Business-driven security strategy to prevent failure of vital digital transformation projects which will become irrelevant to the business model of an organisation.

Image

PCI-DSS_3.2 - 2018 Changes

The Payment Card Industry Data Security Standard (PCI DSS) was developed to follow the policy and standards of cardholder data security which consistent data security measures globally

Image

Critical Corporate Cyber Security Risks-A Data-Driven List

It is a well-known fact that most of the corporate organisations have been the target of black-hat hackers and hacktivist groups, and they were experiencing data breaches, server compromise etc.

Image

SQL Injection -Using Burp Suite

SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL

Image

Host Header Attack

Most of the common web servers are configured in the form of the same server to host many web applications with the same IP address this type of configuration is the reason for the Host Header issues. Here we are going to deal with the host header injection attack in various forms, its impact and mitigation

Image

CWE-78 Improper Neutralization Of Special Elements Used In An OS Command Injection

OS command injection is a technique used via a web interface in order to execute OS commands on a web server. The user supplies operating system commands through a web interface in order to execute OS commands.

Image

CWE-79 Improper Neutralization Of Input During Web Page Generation Cross-Site Scripting

Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.

Image

Cross Site Port Attack XSPA

A web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.

Image

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications. It favours convention over configuration and is extensible using a plugin for supporting REST, AJAX, and JSON.