Security Advisory – Email Phishing
In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted to our everyday work…
Read MoreSecurity Advisory – Typosquatting
There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the threat of getting infected with…
Read MoreBest Practices to Harden Office 365
1. Password Policy It is always recommended to use a strong password policy to help secure the data and service access. In Office 365 for…
Read MoreSecurity Advisory – Ransomware Attack Targeting China – December 2018
1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a result of supply chain attack targeting Chinese users starting from December 1…
Read MoreSecurity Advisory – Tecnimont Cyber Theft
Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 operating companies in the engineering…
Read MoreSecurity Advisory – Saipem Cyber Attack by Shamoon Malware
1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had primarily affected its servers in the Middle East. The cyber-attack hit…
Read MoreMicrosoft Zero Day – VCard Vulnerability
Introduction: A zero-day vulnerability has been discovered and reported in the Microsoft’s Windows operating system. Under a certain scenario it could allow a remote attacker…
Read MoreThe Art of Communication, Interpretation & Validation: ChatBots
“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate conversation with human users over…
Read MoreBlockchain Security – Part 1
Blockchain History The core ideas behind blockchain technology emerged in the late 1980s and early 1990s. In 1989, Leslie Lamport developed the Paxos protocol, and…
Read MoreWeb Services Security Testing
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the many people are using the…
Read MoreCategories
- Android Security (8)
- Authentication & Authorization (12)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (4)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (3)
- Company Events (1)
- Containerization Security (1)
- Corporate Training (4)
- Cyber Attack (9)
- Data Breaches (12)
- Data Leakage (15)
- Data Privacy (16)
- Email Phishing (3)
- Encryption & Cryptography (10)
- Ethical Hacking (11)
- General (2)
- iOS Security (2)
- IOT Security (2)
- Java Security (2)
- Mobile Application Security (11)
- Mobile Device Management (6)
- Network Pentesting (5)
- News (20)
- Password Security (3)
- Patch Management (3)
- Ransomware Attack (4)
- Reverse Engineering (3)
- Secure SDLC (3)
- Security Advisory (26)
- Security Best Practices (22)
- Security Hardening (19)
- Social Engineering Attack (5)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Viruses & Malware (11)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (19)
- Web Application Security (12)
- Webinar (1)
- Windows Mobile Security (1)
- Zero Day Attack (6)