Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases…
What is a JSON web token (JWT)? A JSON web token (JWT) token is an open standard which defines the…
About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is…
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT…
By now, we all already went through COVID pandemic’s first wave. The second wave has started hitting the world. Though…
Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…
This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache…
Introduction A Subdomain Takeovers A hostile takeover of a subdomain by an attacker is known as a subdomain takeover. This…
Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul…
This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities! …