Image
1.1 K
Views
17th May 2022 1147

The Next New Evolution of PCI DSS-What is New in v4.0

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.

Image
1.5 K
Views
12th May 2022 1483

Json web token and its exploitation

As an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).

Image
1.6 K
Views
10th May 2022 1567

80 percent of the backend technologies have banner exposed why is it a serious issues

Banner grabbing or active reconnaissance is a type of attack during which the attackers send requests to the system they are attempting to attack in order.

Image
2 K
Views
4th May 2022 1997

Is Beast Attack Really Breaking Your SSL TLS

BEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.

Image
1.2 K
Views
28th April 2022 1208

Is there a way I can tell if my data of digital asset is out there?

Yes, and that magic wand is OSINT Report or Open Source Intelligence Report. It involves analyzing and reporting the exposed data on the target website...

Image
1.2 K
Views
21st December 2021 1192

Security Flaws in Third Party Apps

One thing that you have to remember is that outside parties such as auditors, customers don’t care how vulnerabilities got into your environment. Even if your hands are tied, application security flaws can and likely will .

Image
1.6 K
Views
21st December 2021 1571

Cyber-Security in Automotive Industry

Modern cars have dozens of computers onboard, and they are not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering.

Image
1.3 K
Views
15th December 2021 1293

Introduction to HTTP Request Smuggling Vulnerability

HTTP Request Smuggling is one of the critical web application vulnerabilities that is often goes unnoticed by many security reasearchers and penetration testers due to its complexity.

Image
1.3 K
Views
15th December 2021 1256

Importance of Cyber Hygiene in Financial sectors

The Center for Internet Security (CIS) and the Council on Cyber Security (CCS) defines cyber hygiene as a means to appropriately protect and maintain IT systems and devices and implement cyber security best practices.

Image
2.5 K
Views
13th December 2021 2500

What and How to address LOG4J CVE-2021-44228 Vulnerability?

CVE-2021-44228 is the name of the zero-day vulnerability, which can affect any programme that logs user input. The effect may be seen in a variety of places, including Minecraft, which registers the names of users.

Image
1.6 K
Views
16th November 2021 1554

6 Cybersecurity measures that Organizations tend to overlook

Cyberattacks are a major nuisance that aren't going anywhere anytime soon. Growing at an estimated 15% year over year, cybercrime costs to organizations worldwide are forecast to reach $10.5 trillion annually by 2025.

Image
1.1 K
Views
2nd November 2021 1145

Identification and Exploitation of CVE 2021-41773 Apache Vulnerability

Apache is one of the most popular open-source web servers available in the market for both Windows and Linux operating systems. It is one of the reliable and flexible web.