Image
5 K
views
31st July 2019 4994

The security and privacy risks of face recognition authentication

Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military

Image
6.9 K
views
11th October 2018 6881

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

Image
8.6 K
views
8th July 2019 8643

Android Manifest File Analysis 101

Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

Image
26.7 K
views
4th May 2019 26676

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

Image
1.5 K
views
7th July 2023 1453

Maximizing Security: Uncovering Threats with In-house Security and External VAPT Team

Discover how combining in-house security expertise with external VAPT teams can maximize your organization's security.

Image
1.1 K
views
30th June 2023 1133

Top 10 Compelling Reasons Why Web Application Security Testing Should Be a Priority

In today's interconnected world, where businesses rely heavily on web applications to interact with customers.

Image
4.3 K
views
22nd July 2022 4266

What is the difference between VA and PT ?

Thief plots heist at home. It takes him some time to figure out how to get into the house without being noticed. What we're doing here is called Vulnerability assessment.The thief could have used a glass door .

Image
1.7 K
views
27th February 2023 1650

Top 10 reasons to partner with briskinfosec cybersecurity experts to prevent cyberattacks and data breaches

If you're a business owner, you know that cybersecurity is an essential concern.

Image
2.6 K
views
21st June 2022 2581

Is there a difference between authentication and authorization in an API?

As with web applications, APIs operate on the web, but many require some sort of authentication or authorization before you can access the valuable.

Image
3.3 K
views
4th May 2022 3331

Is Beast Attack Really Breaking Your SSL TLS

BEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.

Image
2.3 K
views
18th January 2019 2266

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

Image
3.8 K
views
23rd August 2022 3768

Why should we use a proxy server?

People don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).

Image
3.7 K
views
25th August 2022 3686

HTTPS Request Smuggling Attacks and How to Stop Them?

Who will offer $36,000 for finding a bug? Yes, it has happened. And, by the the greatest company of the planet: Apple. From the prize, you can well understand the magnanimity .

Image
2.2 K
views
13th October 2022 2153

What is Black box Security Testing?

In this kind of testing, the penetration tester acts like a normal hacker who doesn't know anything about the target system.Testers don't get any diagrams of the architecture or source code that isn't available to the public.

Image
4.1 K
views
6th November 2019 4109

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

Image
2.8 K
views
30th September 2019 2753

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

Image
2.2 K
views
30th June 2022 2203

How to save yourself from Phishing attacks? A quick guide

Phishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It

Image
2.6 K
views
30th January 2019 2645

Are you still fighting against decade old application attacks

In this modern digital era, online transactions play a pivotal role.

Image
2.8 K
views
6th November 2019 2780

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

Image
2.4 K
views
21st September 2022 2373

iOS architecture the setup the pros and the cons

If you have used a smartphone or a tablet, then you have probably come across the Android operating system and the iOS mobile operating system. Both of these mobile operating systems

Image
5 K
views
11th October 2022 5008

What is the difference between OWASP Top 10 and ASVS Security Audit

OWASP is the blueprint for testing the web application security controls. It is safe to say that it helps the developers to develop application.