kalpblogger

Insecure Direct Object Reference (IDOR)

What is an Insecure Direct Object Reference (IDOR) Risk?  IDOR stands for Insecure Direct Object Reference occurring when an application…

4 years ago

Port Forwarding – Pivoting and Tunneling

Port forwarding is a key activity in any network security testing. Once we get an initial foothold into the victim…

4 years ago

IT Security Controls

IT security controls play a foundational role in shaping the efforts security professionals take to protect an organization. Security Controls…

4 years ago

Adware – New Age Weapon

Are you seeing ads every time while browsing the web and it is asking you to install software or enter…

4 years ago

Cyber Law in INDIA

In this article we will see in detail overview of Cyber Law in India and various sections of IT Act…

4 years ago

DROZER – Android Security Assessment Framework

Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security…

4 years ago

ASSET SECURITY

When we think of asset security, at the first glance it looks pretty simple. After all, what is the big…

4 years ago

Covid 19 and Business Continuity Planning

COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for…

4 years ago

Essentials of Third Party Risk Management (TPRM)

Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate…

4 years ago

“OAuth” Related Vulnerabilities

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows…

4 years ago