Your Perfect Cybersecurity Partner

Stay Connected:

Image
1.8 K
views
22nd January 2019 1753

Top Trending Web app security Vulnerabilities

For a long time in the cyber security world, Web applications are subjected to various kinds of security vulnerabilities because of the increase in its usage and the use of dynamic web application technologies

Image
2.9 K
views
6th November 2019 2890

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

Image
1.6 K
views
29th April 2020 1632

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

Image
3 K
views
14th May 2019 3000

Cyber Security Products Vs Cyber Security Services

Information has become the most valuable asset in today’s trend. There are many protective methods that are followed by many countries and organizations for ensuring consistent workflow.

Image
4 K
views
6th October 2018 4023

Cross Site Port Attack XSPA

A web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.

Image
1.8 K
views
18th October 2019 1805

What Do You Need To Know About Cyber Kill Chain?

The Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).

Image
1.1 K
views
1st September 2022 1054

Docker Security Best Practices

Docker is a software platform that enables the development and deployment of containerized applications and services.It is a Platform as a Service (PaaS) that uses the host OS Kernel instead of hypervisors like VirtualBox. Docker containers contain all of the dependencies.

Image
1.1 K
views
8th September 2022 1104

What Are Security Headers and How Can We Implement Them For our Website?

When a browser asks a web server for a page, the server sends back the page's content along with headers. Some headers have meta-data about the content,

Image
5.6 K
views
28th May 2019 5561

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

Image
23.8 K
views
3rd October 2018 23774

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

Image
10.7 K
views
8th October 2018 10679

SQL Injection -Using Burp Suite

SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL

Image
1.1 K
views
30th June 2022 1054

How to save yourself from Phishing attacks? A quick guide

Phishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It

7th July 2022 967

Why Cloud Forensics Fail?

Digital Forensics is the field of forensic science that is concerned with retrieving, storing and analyzing electronic data that can be useful in criminal investigations. This includes information from computers, hard drives, mobile phones

Image
2.4 K
views
6th October 2018 2438

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

13th September 2022 823

Does your application Hosted on the cloud is really secure?

For many years, security has been a key issue whenever data has be placed online, and the rise of cloud computing hasn't done much to ease people's fears. In reality, it had the opposite effect on many people.

5th October 2021 800

Microsoft MSHTML Remote Code Execution Vulnerability - CVE -2021-40444

Microsoft has disclosed a zero-day vulnerability, CVE-2021-40444, which allows malicious code to be executed remotely on users' system

Image
1.7 K
views
14th March 2019 1683

Drupal Core Remote Code Execution Vulnerability: CVE-2019-6340

Drupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.

Image
1.5 K
views
11th February 2019 1508

How to become ethical hacker and shine like stars?

One of the fastest growing information technology careers is Ethical hacking.

21st December 2021 908

Security Flaws in Third Party Apps

One thing that you have to remember is that outside parties such as auditors, customers don’t care how vulnerabilities got into your environment. Even if your hands are tied, application security flaws can and likely will .

Image
1 K
views
21st December 2021 1015

Cyber-Security in Automotive Industry

Modern cars have dozens of computers onboard, and they are not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering.

15th December 2021 851

Importance of Cyber Hygiene in Financial sectors

The Center for Internet Security (CIS) and the Council on Cyber Security (CCS) defines cyber hygiene as a means to appropriately protect and maintain IT systems and devices and implement cyber security best practices.