Briskinfosec - Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
7th September 2020 756

CWE-78 Improper Neutralization Of Special Elements Used In An OS Command Injection

OS command injection is a technique used via a web interface in order to execute OS commands on a web server. The user supplies operating system commands through a web interface in order to execute OS commands.

7th September 2020 570

Have You Known About Such Things In Connected Cars?

Connected cars is the next stage of automotive development fuelling to IoV (Internet of Vehicles). They’re equipped with internet access and WLAN (wireless local area network).

7th September 2020 350

Why Should we be aware about quantum computing ?

Computers are getting outdated now a days due to technological developments and rampant security threats.

7th September 2020 509

Top Trending Web app security Vulnerabilities

For a long time in the cyber security world, Web applications are subjected to various kinds of security vulnerabilities because of the increase in its usage and the use of dynamic web application technologies

7th September 2020 417

How to choose the right security provider

In last decade, companies and individuals have seen the real impact of cyber security threats from all industries and even related to government.

7th September 2020 558

DevSecOps in the age of the cloud

In DevOps, the application is often releasing new features and functionalities. In every release, the business needs are deployed in the cloud for flexibility and service delivery but often they are skipping the information security service in completing the organisation’s on-time release

7th September 2020 304

Why Cloud Security is Essential?

Most of the personnel’s believe that cloud services are one hundred percentage secure as it is from industry giants, but the reality is being a cloud native won’t completely save you from external threats

7th September 2020 349

The End of Passive Trust

A data breach is a confirmed incident when a sensitive, confidential or otherwise protected data has been accessed and disclosed in an unauthorised fashion.

7th September 2020 339

Data Protection in India

In India, there was a dramatic change in the last one decade with the latest trends and technologies implemented in the Government Bodies / Corporate Sectors and data has been transmitted through different channels

7th September 2020 593

Sparta

Sparta is a Python based GUI application and it’s a network infrastructure pentesting tool by aiding the pentesters in performing scanning and enumeration phase

7th September 2020 529

101 Techniques to secure your AI product

Nowadays, Artificial intelligence (AI) plays a pivotal role on daily activities to increased data volumes, advanced algorithms, and improvements in computing power and storage.

7th September 2020 908

CWE-79 Improper Neutralization Of Input During Web Page Generation Cross-Site Scripting

Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.

7th September 2020 426

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

7th September 2020 1043

Why Thick Client Application Security Is Important?

Various people use various applications for getting their various needs done. Amongst those applications that’re used, the most prominent one’s are thick-client applications.

7th September 2020 454

Will your backups protect you against ransomware?

In this Digital world everything is information, so called data. If you don’t protect these data in the backup then business would fail. Those backups will help in case of disaster

7th September 2020 557

What Do You Need To Know About Cyber Kill Chain?

The Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).

7th September 2020 459

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

7th September 2020 1378

Server Side Includes Injection

Server Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.

7th September 2020 338

NIST Cyber security Framework

The Framework offers an agile way to address cybersecurity, including cybersecurity’s effect on physical, cyber, and people dimensions. It applies to organisations relying on technology

7th September 2020 582

Beware of Data War

Data as general is a set of information, knowledge or fact that is measured and stored in storage devices.