MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)
In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and a brief introduction to Malware…
Read MoreHTTP Parameter Pollution
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to the back-end as well as…
Read MoreWebSocket Overview
What is a WebSocket? WebSocket is a Client-Server Communication protocol initiated over HTTP. WebSockets are used where there is continuous streaming of data…
Read MoreIntroduction to Information Security Management Systems (ISMS)
What is an ISMS? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational confidential data and help to…
Read MoreHTTP Request Smuggling
What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one or more HTTP devices or…
Read MoreRisk Management
Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However, risk assessment is highly crucial…
Read MoreMisconfigured Cross-Origin Resource Sharing (CORS) Risk
The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between websites, served on different domains,…
Read MoreDatabase Configuration Audit for Security and Compliance [Part-1]
Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to produce and store a prioritized…
Read MoreJWT Attack – Most Common Scenarios
What is a Json web token (JWT)? A JWTtoken is an open standard that defines the compact and secure way of transmitting data or information….
Read MorePA DSS V 3.2 to SUNSET by 2022
About PA DSS The Payment Application Data Security Standard (PA-DSS), formerly referred to as the Payment Application Best Practices (PABP), is the global security standard…
Read MoreCategories
- Android Security (8)
- Authentication & Authorization (12)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (4)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (3)
- Containerization Security (1)
- Corporate Training (4)
- Cyber Attack (9)
- Data Breaches (11)
- Data Leakage (14)
- Data Privacy (16)
- Email Phishing (2)
- Encryption & Cryptography (10)
- Ethical Hacking (11)
- General (2)
- iOS Security (2)
- IOT Security (2)
- Java Security (2)
- Mobile Application Security (11)
- Mobile Device Management (6)
- Network Pentesting (5)
- Password Security (3)
- Patch Management (3)
- Ransomware Attack (4)
- Reverse Engineering (3)
- Secure SDLC (3)
- Security Advisory (24)
- Security Best Practices (20)
- Security Hardening (19)
- Social Engineering Attack (4)
- Social Networking Security (4)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (2)
- Unix/Linux Security (1)
- Viruses & Malware (10)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (17)
- Web Application Security (9)
- Windows Mobile Security (1)
- Zero Day Attack (5)