kalpblogger

Json web token (JWT) Attack – Most Common Scenarios

What is a JSON web token (JWT)? A JSON web token (JWT) token is an open standard which defines the…

5 years ago

PA DSS V 3.2 to SUNSET by 2022

About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is…

5 years ago

Privacy Now to be a Fundamental Right in India

Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT…

5 years ago

How we are successfully managing & delivering the Cybersecurity Services during COVID-19 situation?

By now, we all already went through COVID pandemic’s first wave. The second wave has started hitting the world. Though…

5 years ago

Web Cache Poisoning – Through Host Header Injection

Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a…

5 years ago

Apache Struts-2 Exploited to Remote Code Execution

This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache…

5 years ago

Subdomain Takeovers – CNAMEs And Cloud Services

Introduction A Subdomain Takeovers A hostile takeover of a subdomain by an attacker is known as a subdomain takeover. This…

5 years ago

Threat Modelling – Focused Defence for Modern Enterprises

Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul…

5 years ago