Security Advisory – Typosquatting

7 years ago

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…

Best Practices to Harden Office 365

7 years ago

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

Security Advisory – Ransomware Attack Targeting China – December 2018

7 years ago

Ransomware Attack Targeting China - Security Advisory  1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a…

Security Advisory – Tecnimont Cyber Theft

7 years ago

Tecnimont Cyber Theft - Security Advisory   Background: Maire Tecnimont SpA is the parent company of the Italian group Maire…

Security Advisory – Saipem Cyber Attack by Shamoon Malware

7 years ago

Saipem Cyber Attack by Shamoon Malware 1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had…

Microsoft Zero Day – VCard Vulnerability

7 years ago

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…

The Art of Communication, Interpretation & Validation: ChatBots

7 years ago

“Hello Alexa, may I have a strategy to test you? “   What is ChatBot? A computer program designed to…

Blockchain Security – Part 1

7 years ago

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

Web Services Security Testing

7 years ago

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

Introduction to Internet of Things (IoT)

7 years ago

Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…