Android Penetration Testing with Drozer
Introduction to Android Application Security Testing Framework – Drozer: Drozer is an android application security testing framework which is developed by FSecureLABS that makes it…
Antivirus Evasion – Part 1
1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred to as malware, on your…
All you need to know about Android WebView Vulnerabilities
In this blog we are going to understand about Android WebView Vulnerabilities. What is WebView ? The WebView class in android allows you to load…
Guide to Identity & Access Management (IAM)
Introduction to Identity and Access Management Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning and de-provisioning of identities, securing…
Ransomware and the measures to safeguard an organisation
Ransomware Attack and Its Prevention We are all aware of ransomware, as most of us, or at least someone in our connection might be a…
Intro to GraphQL – Attack Scenarios
Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing queries for preexisting data. It…
Mitigating Cross-Site Request Forgery (CSRF) Attacks
What is Cross-Site Request Forgery (CSRF)? Cross-Site Request Forgery (CSRF) is a widely known web security vulnerability that enables a malicious user to induce another…
WEB CACHE DECEPTION
Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of the caching functionality in the…
Attacking Android Components – Content Providers
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What are Content Providers and…
Roadmap to FedRAMP Compliance
The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server or hardware to process his…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (22)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (1)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (34)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (42)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)