Database Configuration Audit for Security and Compliance [Part-1]

5 years ago

Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases…

Json web token (JWT) Attack – Most Common Scenarios

5 years ago

What is a JSON web token (JWT)? A JSON web token (JWT) token is an open standard which defines the…

PA DSS V 3.2 to SUNSET by 2022

5 years ago

About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is…

Privacy Now to be a Fundamental Right in India

5 years ago

Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT…

How we are successfully managing & delivering the Cybersecurity Services during COVID-19 situation?

5 years ago

By now, we all already went through COVID pandemic’s first wave. The second wave has started hitting the world. Though…

Web Cache Poisoning – Through Host Header Injection

5 years ago

Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…

Apache Struts-2 Exploited to Remote Code Execution

5 years ago

This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache…

Subdomain Takeovers – CNAMEs And Cloud Services

5 years ago

Introduction A Subdomain Takeovers A hostile takeover of a subdomain by an attacker is known as a subdomain takeover. This…

Threat Modelling – Focused Defence for Modern Enterprises

5 years ago

Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul…

Zooming Security Vulnerabilities [Part – 2]

5 years ago

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities!  …