Increased use of Multi-factor Authentication

4 years ago

What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) refers to an authentication method that necessitates the user to provide more…

Android Penetration Testing with Drozer

4 years ago

Introduction to Android Application Security Testing Framework - Drozer: Drozer is an android application security testing framework which is developed…

Antivirus Evasion – Part 1

4 years ago

1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred…

All you need to know about Android WebView Vulnerabilities

4 years ago

In this blog we are going to understand about Android WebView Vulnerabilities. What is WebView ? The WebView class in…

Guide to Identity & Access Management (IAM)

4 years ago

Introduction to Identity and Access Management Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning…

Ransomware and the measures to safeguard an organisation

4 years ago

Ransomware Attack and Its Prevention We are all aware of ransomware, as most of us, or at least someone in…

Intro to GraphQL – Attack Scenarios

4 years ago

Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing…

Mitigating Cross-Site Request Forgery (CSRF) Attacks

4 years ago

What is Cross-Site Request Forgery (CSRF)? Cross-Site Request Forgery (CSRF) is a widely known web security vulnerability that enables a…

WEB CACHE DECEPTION

4 years ago

Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of…

Attacking Android Components – Content Providers

4 years ago

In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability.  …