Web Application Security

See more articles

Mobile Application Security

See more articles

Network Security

See more articles

Website Security

See more articles

API Security

See more articles

Cloud Application Security

See more articles

Host Level Security

See more articles
  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

    Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

  • Image

    What Do You Need To Know About Cyber Kill Chain?

    The Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).

  • Image

    DNS Zone Transfer

    In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

Cyber Intelligence

See more articles

Thick Client Security

See more articles

Threat Vulnerability

See more articles

Secure Source Code Review

See more articles
  • Image

    Level Up Your Dev Team: An Open Source Tool Checklist for Secure Code Development Culture

    The protection of software applications against potential flaws and security breaches in today's digital environment .

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Android Manifest File Analysis 101

    Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

  • Image

    Null Byte SQL Injection

    Null Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .

Database Security

See more articles
  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Growing Data Breaches And The Best Ways To Be Safe From Them

    Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

  • Image

    Null Byte SQL Injection

    Null Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .

  • Image

    The End of Passive Trust

    A data breach is a confirmed incident when a sensitive, confidential or otherwise protected data has been accessed and disclosed in an unauthorised fashion.

IoT Security

See more articles
  • Image

    What is IOT Forensics?

    The term Internet of Things"was first used in 1999 to promote a technology called Radio Frequency Identification. IoT didn't become more popular until 2010/2011. By early 2014, it was used by most people. IoT forensics is a type of digital forensics that looks

  • Image

    iOS architecture the setup the pros and the cons

    If you have used a smartphone or a tablet, then you have probably come across the Android operating system and the iOS mobile operating system. Both of these mobile operating systems

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

    Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

Wireless Security

See more articles

Cyber Security Statergy

See more articles

Artificial Intellegence

See more articles
  • Image

    Docker Security Best Practices

    Docker is a software platform that enables the development and deployment of containerized applications and services.It is a Platform as a Service (PaaS) that uses the host OS Kernel instead of hypervisors like VirtualBox. Docker containers contain all of the dependencies.

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Have you heard about BNPT-Docker?

    To scan a target, both cybersecurity veterans and novice pen-testers primarily use the open source scanning tools. In order to obtain the best possible results.

Information Security

See more articles
  • Image

    Does your application Hosted on the cloud is really secure?

    For many years, security has been a key issue whenever data has be placed online, and the rise of cloud computing hasn't done much to ease people's fears. In reality, it had the opposite effect on many people.

  • Image

    What Are Security Headers and How Can We Implement Them For our Website?

    When a browser asks a web server for a page, the server sends back the page's content along with headers. Some headers have meta-data about the content,

  • Image

    Docker Security Best Practices

    Docker is a software platform that enables the development and deployment of containerized applications and services.It is a Platform as a Service (PaaS) that uses the host OS Kernel instead of hypervisors like VirtualBox. Docker containers contain all of the dependencies.

  • Image

    Why Cloud Forensics Fail?

    Digital Forensics is the field of forensic science that is concerned with retrieving, storing and analyzing electronic data that can be useful in criminal investigations. This includes information from computers, hard drives, mobile phones

Quantam Computing

See more articles

Cryptocurrency

See more articles
  • Image

    Importance of Cyber Hygiene in Financial sectors

    The Center for Internet Security (CIS) and the Council on Cyber Security (CCS) defines cyber hygiene as a means to appropriately protect and maintain IT systems and devices and implement cyber security best practices.

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Growing Data Breaches And The Best Ways To Be Safe From Them

    Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

  • Image

    Future is Cryptocurrency Era

    The prevalence of Barter system (giving solid cash for the purchased commodity) is still on-going, perhaps the reign of digital era. Contrary to this, there is another form of high level digital transaction

Patch Management

See more articles
  • Image

    Do you postpone the windows patch update?

    If you do postpone, you might want to read this one. Many employee’s in the organization are using the old unpatched server, because of the blue screen error, system restart & update time.

  • Image

    Why Patch Management is Required for Business?

    The term “Software Patch” refers to code change, update or upgrade for an application or an operating system. In cybersecurity, “Patch” refers to a security update the said application or operating system.

Remediation Verification

See more articles
  • Image

    Remediation Verification Penetration Test

    When organisations are performing penetration testing or secure code review, they will get a number of vulnerabilities to be remediated and will start fixing those during the next assessment.

Automotive Cybersecurity

See more articles
  • Image

    Cyber-Security in Automotive Industry

    Modern cars have dozens of computers onboard, and they are not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering.

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Troubling Security issues in Controller Area Network

    Controller Area Network (CAN) is the widely used In-vehicle networking. When seen from a normal point of view, CAN is really powerful in transmitting all the critical and non-critical

  • Image

    Have You Known About Such Things In Connected Cars?

    Connected cars is the next stage of automotive development fuelling to IoV (Internet of Vehicles). They’re equipped with internet access and WLAN (wireless local area network).

Hardware Hacking

See more articles
  • Image

    Cyber-Security in Automotive Industry

    Modern cars have dozens of computers onboard, and they are not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering.

  • Image

    Evolution of Ransomware and the trends in 2020

    Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

  • Image

    Why You Might Be Failing at the Hardware Attack

    Have you ever heard of stealing data from computer via hardware stuff? If you haven’t yet, I’ve got to reveal you that yes, something like that is indeed done.

Healthcare

See more articles

Compliance

See more articles

Manufacturing Industry

See more articles