Your Perfect Cybersecurity Partner

Stay Connected:

Image
1.4 K
Views
9th July 2019 1415

Why Patch Management is Required for Business?

The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

Image
1 K
Views
9th July 2019 1036

Remediation Verification Penetration Test

When organisations are performing penetration testing or secure code review, they will get a number of vulnerabilities to be remediated and will start fixing those during the next assessment.

Image
5 K
Views
8th July 2019 5035

Android Manifest File Analysis 101

Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

Image
7.8 K
Views
1st June 2019 7790

FTP Penetration Testing

Well, this blog will describe the possible ways to attack the FTP servers to compromise your files or the internal network of the organization, how the attacker would try to exploit the FTP, and best possible ways to defend the attack.

Image
1.8 K
Views
31st May 2019 1751

SIEM Integration

SIEM Integration is a comprehensive solution for capturing, retention, and delivery of security information and events, in real-time to SIEM applications.

Image
3.1 K
Views
30th May 2019 3102

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

Image
1.5 K
Views
30th May 2019 1541

Security and Privacy in IoT

In todays world, each and every device is metamorphosing into digital and all these devices are being connected with other devices for aiding mankind.

Image
1 K
Views
29th May 2019 1023

Why Cloud Security is Essential?

Most of the personnel’s believe that cloud services are one hundred percentage secure as it is from industry giants, but the reality is being a cloud native won’t completely save you from external threats

Image
3.2 K
Views
29th May 2019 3186

Server Side Includes Injection

Server Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.

Image
5.5 K
Views
28th May 2019 5531

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

Image
1.4 K
Views
27th May 2019 1357

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

Image
1.1 K
Views
21st May 2019 1069

Why Should we be aware about quantum computing ?

Computers are getting outdated now a days due to technological developments and rampant security threats.