Image
1.3 K
views
27th June 2023 1315

Why VAPT is Crucial for Your Organizations Security-Beyond Compliance

Organizations face multiple cybersecurity dangers in the digital age, which could compromise confidential information.

Image
4.4 K
views
22nd July 2022 4436

What is the difference between VA and PT ?

Thief plots heist at home. It takes him some time to figure out how to get into the house without being noticed. What we're doing here is called Vulnerability assessment.The thief could have used a glass door .

Image
1.1 K
views
26th May 2023 1130

Strengthening Security for BSFI SaaS Products: Leveraging the Power of OWASP ASVS

In the fast-paced world of Banking, Financial Services, and Insurance (BSFI), organizations rely heavily on Software as a Service (SaaS).

Image
1.7 K
views
27th February 2023 1742

Top 10 reasons to partner with briskinfosec cybersecurity experts to prevent cyberattacks and data breaches

If you're a business owner, you know that cybersecurity is an essential concern.

Image
2.6 K
views
16th June 2022 2606

Is CDN WAF enough to protect your web application?

What would you say if we told you that certain service was at USD 1.53 Billion in 2016 and is expected to reach USD 7.63 Billion by 2022.Is not this an exponential increase? Yes, that service is CDN WAF.

Image
2.5 K
views
24th May 2022 2450

How To Minimize The Impact Of False Positives?

Web applications are updated on a frequent basis in today's fast-paced development settings, and agile, integrated methodologies like DevOps are swiftly becoming the norm.To design, test, and update diverse apps

Image
2.7 K
views
21st June 2022 2687

Is there a difference between authentication and authorization in an API?

As with web applications, APIs operate on the web, but many require some sort of authentication or authorization before you can access the valuable.

Image
4 K
views
20th August 2019 4026

Guidelines to Secure Web Services and API End-Points

Web Service is a software service used to create a communication between 2 devices connected over a network through internet.

Image
3.5 K
views
4th May 2022 3483

Is Beast Attack Really Breaking Your SSL TLS

BEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.

Image
3.5 K
views
5th July 2022 3544

What Is FTP Penetration Testing and What It Is Not?

File transfer protocol, a standardized protocol used to allow transmission of files between computers. It consists of a set of coded signals which are transmitted between computers, and which inform

Image
2.4 K
views
12th May 2022 2440

Json web token and its exploitation

As an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).

Image
2.8 K
views
10th August 2022 2798

What is the difference between Manual Penetration Testing versus Automated Penetration Testing?

The new normal has made the market bigger for digital transformation projects and strategies for moving to the cloud.

Image
4.6 K
views
6th October 2018 4637

Command Execution Attacks on Apache Struts server CVE-2017-5638

Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.

Image
3.2 K
views
10th May 2022 3195

80 percent of the backend technologies have banner exposed why is it a serious issues

Banner grabbing or active reconnaissance is a type of attack during which the attackers send requests to the system they are attempting to attack in order.

Image
6.3 K
views
29th July 2022 6277

XML Rpc Attack

Yes, I am talking about U.S department of defense get hacked. Bibek Dhakal found that the xmlrpc.php file on the U.S. Department of Defense website had been turned on leaving it open to an attack on other sites. The XML Rpc.php in WordPress is turned on by default

Image
4 K
views
23rd August 2022 3994

Why should we use a proxy server?

People don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).

Image
3.9 K
views
25th August 2022 3889

HTTPS Request Smuggling Attacks and How to Stop Them?

Who will offer $36,000 for finding a bug? Yes, it has happened. And, by the the greatest company of the planet: Apple. From the prize, you can well understand the magnanimity .

Image
2.2 K
views
7th October 2022 2164

What weak credentials can do?

Yes! Hacking people's accounts is illegal. Hacker’s are enjoyed playing with weak credentials. A weak password is one that is easy to guess using a subset of all possible passwords in a brute force attack.

Image
2.3 K
views
13th October 2022 2275

What is Black box Security Testing?

In this kind of testing, the penetration tester acts like a normal hacker who doesn't know anything about the target system.Testers don't get any diagrams of the architecture or source code that isn't available to the public.

Image
3.6 K
views
8th September 2022 3587

What Are Security Headers and How Can We Implement Them For our Website?

When a browser asks a web server for a page, the server sends back the page's content along with headers. Some headers have meta-data about the content,

Image
4.2 K
views
6th November 2019 4201

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.