Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
2nd March 2021 593

Beware of NetWire RAT Malware spread via Microsoft Excel 4.0 Macro

Excel is a spreadsheet developed by Microsoft that features calculation, graphing tools and macro program language

3rd December 2020 984

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

3rd December 2020 1091

Layer Wise Analysis of Security in IOT

We find IoT in a wide range of applications, including smart cities, control actuation and maintenance of complex systems in industry health, transport and much more

2nd December 2020 16434

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

2nd December 2020 550

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

2nd December 2020 658

The security and privacy risks of face recognition authentication

Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military

2nd December 2020 443

Why large organizations suffer frequent cyber-attacks than smaller ones?

We often feel lazy or forget to carry things to our office. So, we need everything to be in our machine and due to lack of space.

23rd September 2020 561

Security Challenges In RFID : It is Not as Difficult as You Think

RFID is a device which works basically on the electromagnetic waves. Its operating frequency varies from 135KHz - 5.8GHZ and these are closely coupled circuits.

23rd September 2020 389

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

23rd September 2020 550

Patch Management

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

23rd September 2020 538

Why You Might Be Failing at the Hardware Attack

Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

23rd September 2020 500

Dumpster Diving-Your Unused Modem Hardware can Leak Your Critical Data

We will all be familiar with the attack surfaces in web,mobile,network and cloud technologies but haven’t you heard about the hardware

23rd September 2020 7636

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

23rd September 2020 658

How your RF layer is exposed to serious cyberattacks?

RF remote controllers are used in most of the devices varying from remote control toy cars to heavy equipment’s used in mining operations and factory floor.

23rd September 2020 593

Troubling Security issues in Controller Area Network

Controller Area Network (CAN) is the widely used In-vehicle networking. When seen from a normal point of view, CAN is really powerful in transmitting all the critical and non-critical

23rd September 2020 774

Guidelines to Secure Web Services and API End-Points

Web Service is a software service used to create a communication between 2 devices connected over a network through internet.

23rd September 2020 562

Chat-Bot Security: Secure or A Way for Intruder

A Chat-bot is more like an Artificial Intelligence (AI) program which is used to setup a conversation with the end user (human) in a preprogrammed human language

23rd September 2020 737

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

23rd September 2020 4551

SQL Injection -Using Burp Suite

SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL

23rd September 2020 2085

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

7th September 2020 1858

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.