“OAuth” Related Vulnerabilities

4 years ago

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows…

Sweet32 Birthday Attack Approach

4 years ago

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32…

SECOND ORDER SQL INJECTION ATTACK

4 years ago

Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know…

Server-Side Template Injection Vulnerability & Exploitation

4 years ago

In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting…

Challenges Faced in IoT Security

4 years ago

What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each…

Security Orchestration Automation and Response (SOAR)

5 years ago

Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle…

Brand Reputation

5 years ago

Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients,…

Deception Technology: The Art of Recording Cyber Attacks

5 years ago

Introduction To Deception technology:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets…

Zero Trust Maturity Model

5 years ago

What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the…

Threat Hunting & Threat Intelligence

5 years ago

Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and…