icon Book Free Consultation
Image
4 K
views
29th April 2020 4009

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

Read More
Image
2.3 K
views
27th June 2023 2261

Why VAPT is Crucial for Your Organizations Security-Beyond Compliance

Organizations face multiple cybersecurity dangers in the digital age, which could compromise confidential information.

Read More
Image
3.6 K
views
23rd June 2023 3617

Securing PHP Applications: Safeguarding Against the Top 3 Cyber Attacks

Are you aware that more than 810 million web applications, which account for over 30% of all web applications.

Read More
Image
1.6 K
views
18th June 2024 1564

Ransomware The Deadliest Threat to Modern Cybersecurity

Ransomware has emerged as one of the most dangerous and persistent threats in the cybersecurity landscape.

Read More
Image
2.4 K
views
7th July 2023 2414

Maximizing Security: Uncovering Threats with In-house Security and External VAPT Team

Discover how combining in-house security expertise with external VAPT teams can maximize your organization's security.

Read More
Image
3 K
views
26th April 2024 2971

Mastering Web App VAPT The Complete Guide

In today's interconnected digital landscape, web applications serve as the backbone of numerous online services, facilitating everything from e-commerce transactions to social media interactions.

Read More
Image
2.1 K
views
12th July 2023 2057

DNS Hijacking Prevention: Safeguarding Your Domain from Attacks

Protecting your domain against DNS hijacking attempts is essential in the modern digital world.When hostile actors take over a domain's DNS settings.

Read More
Image
3.5 K
views
30th September 2019 3511

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

Read More
Image
5.7 K
views
4th May 2019 5697

How to secure your Github repository?

GitHub is a hosting platform which helps developers to collaborate in building software’s. It helps the developers to manage source code management.

Read More
Image
6.1 K
views
3rd October 2018 6073

CWE-79 Improper Neutralization Of Input During Web Page Generation Cross-Site Scripting

Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.

Read More
Image
6.7 K
views
30th May 2019 6744

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

Read More
Image
6.2 K
views
29th May 2019 6216

Server Side Includes Injection

Server Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.

Read More
Image
8.3 K
views
6th October 2018 8287

Cross Site Port Attack XSPA

A web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.

Read More
Image
11.3 K
views
4th May 2019 11345

Null Byte SQL Injection

Null Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .

Read More
Image
10.5 K
views
28th May 2019 10531

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

Read More
Image
34.6 K
views
3rd October 2018 34599

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

Read More
Image
2.8 K
views
5th August 2022 2789

What are the benefits of Cloud Penetration testing?

It all depends on how you perceive it to be. Most business owners feel that cloud space equals cloud security. Now, before I reveal the answer let’s see the story below; Accenture is no doubt the biggest name in software.

Read More
Image
3.1 K
views
12th May 2022 3088

Json web token and its exploitation

As an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).

Read More
Image
3.7 K
views
10th August 2022 3745

What is the difference between Manual Penetration Testing versus Automated Penetration Testing?

The new normal has made the market bigger for digital transformation projects and strategies for moving to the cloud.

Read More
Image
8.5 K
views
29th July 2022 8493

XML Rpc Attack

Yes, I am talking about U.S department of defense get hacked. Bibek Dhakal found that the xmlrpc.php file on the U.S. Department of Defense website had been turned on leaving it open to an attack on other sites. The XML Rpc.php in WordPress is turned on by default

Read More
Image
5.3 K
views
23rd August 2022 5283

Why should we use a proxy server?

People don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).

Read More