Varutra Consulting Varutra Consulting Varutra Consulting
  • Toggle menu
  • Home 1
  • Company
    • About Us
    • Our Milestones
    • News
    • Events
  • Services
    • Cloud Security
    • Mobile Security
    • Application Security
    • Network Security
    • Virtual CISO (vCISO) Services
    • Audit & Compliance
    • Special Security Services
    • SOC & Global Threat Management Services
    • Information Security Maturity Assessment
    • Security Awareness Program0=-001
  • Regulatory Compliances
    • SEBI – CSCRF: Cyber Security
    • Bank (RBI Master Direction)
    • Cooperative Bank: RBI/2019-20/129 | DoS.CO/CSITE/BC.4083/31.01.052/2019-20
    • Events
  • Industry
  • Research
  • Resources
  • Training
  • Careers
  • Contact
Varutra Varutra Varutra
CALL US
+91 840 8891 911
E-MAIL
Contact Email
  • Home
  • Company
    • About Us
    • Our Milestones
    • News
    • Events
  • Services
    • Cloud Security
    • Mobile Security
    • Application Security
    • Network Security
    • Virtual CISO (vCISO) Services
    • Audit & Compliance
    • Special Security Services
    • SOC & Global Threat Management Services
    • Information Security Maturity Assessment
    • Security Awareness Program
  • Regulatory Compliances
    • Cooperative Bank: RBI/2019-20/129 | DoS.CO/CSITE/BC.4083/31.01.052/2019-20
  • Industry
  • Research
  • Resources
  • Training
    • SPARK program
    • Enquiry
  • Careers
  • Contact
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

by kalpblogger August 5, 2021

What is an Insecure Direct Object Reference (IDOR) Risk?  IDOR stands for Insecure Direct Object Reference occurring when an application displays an indication of an…

Web Application Security
Port Forwarding - Pivoting and Tunneling

Port Forwarding – Pivoting and Tunneling

by kalpblogger July 29, 2021

Port forwarding is a key activity in any network security testing. Once we get an initial foothold into the victim network, our next stage is…

Network Pentesting
IT Security Controls

IT Security Controls

by kalpblogger July 22, 2021

IT security controls play a foundational role in shaping the efforts security professionals take to protect an organization. Security Controls are protecting things that are…

General
Adware – New Age Weapon

Adware – New Age Weapon

by kalpblogger July 15, 2021

Are you seeing ads every time while browsing the web and it is asking you to install software or enter personal details? Clicking on links…

Viruses & Malware
Cyber Law in INDIA

Cyber Law in INDIA

by kalpblogger July 8, 2021

In this article we will see in detail overview of Cyber Law in India and various sections of IT Act 2000.   What is Cyber…

Authentication & Authorization, Governance Risk & Compliance
Android Security Assessment Framework

DROZER – Android Security Assessment Framework

by kalpblogger July 1, 2021

Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security assessment tools available for Android…

Android Security, Mobile Application Security, Mobile Device Management
ASSET SECURITY

ASSET SECURITY

by kalpblogger June 17, 2021

When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…

Android Security, BYOD, Data Privacy, Password Security
Covid 19 and Business Continuity Planning

Covid 19 and Business Continuity Planning

by kalpblogger June 10, 2021

COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for Business Continuity Follow Government/WHO guideline…

General
Essentials of Third Party Risk Management

Essentials of Third Party Risk Management (TPRM)

by kalpblogger June 3, 2021

Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate the adverse effects of risk…

General
“OAuth” Related Vulnerabilities

“OAuth” Related Vulnerabilities

by kalpblogger May 27, 2021

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows the user to view or…

Authentication & Authorization, Web Application Security

Categories

  • Android Security (19)
  • Application security (1)
  • Authentication & Authorization (23)
  • Blockchain Security (1)
  • Bug Bounty (2)
  • BYOD (5)
  • Case Study (29)
  • Chatbot Security (1)
  • Cloud Security (14)
  • Containerization Security (1)
  • Corporate Training (6)
  • Cyber Attack (34)
  • Cybersecurity Frameworks and Solutions (3)
  • Data Breaches (35)
  • Data Leakage (27)
  • Data Privacy (29)
  • Email Phishing (8)
  • Encryption & Cryptography (14)
  • Ethical Hacking (19)
  • General (42)
  • Governance Risk & Compliance (8)
  • iOS Security (2)
  • IOT Security (7)
  • Java Security (2)
  • Mobile Application Security (19)
  • Mobile Device Management (10)
  • Network Pentesting (9)
  • News (48)
  • Password Security (10)
  • Past Events (8)
  • Patch Management (3)
  • Ransomware Attack (14)
  • Reverse Engineering (3)
  • Secure SDLC (5)
  • Security Advisory (34)
  • Security Best Practices (43)
  • Security Hardening (38)
  • Social Engineering Attack (10)
  • Social Networking Security (5)
  • Source Code Review (2)
  • SPAM (2)
  • Student Oriented Courses (2)
  • Thick Client Penetration Testing (4)
  • Unix/Linux Security (1)
  • Upcoming Events (3)
  • Viruses & Malware (16)
  • VoIP Penetration Testing (4)
  • Vulnerability Disclosure (21)
  • Web Application Security (34)
  • Windows Mobile Security (1)
  • Zero Day Attack (8)
Varutra Footer Logo

Quick Links

  • Home
  • Awards & Honours
  • Testimonials
  • Success Stories
  • Careers
  • Blog
  • Case Studies

Services

  • Cloud Security
  • Mobile Security
  • Application Security
  • Network Security
  • Audit & Compliance
  • Special Security Services
  • SOC & Global Threat Management Services
  • Information Security Maturity Assessment
  • Security Awareness Program
  • Training & Education

Contact

  • Phone
    +91 840 8891 911
  • Email Contact Us
  • Varutra Twitter
  • Varutra Facebook
  • Varutra Linkedin
  • Varutra Instagram
  • Varutra Youtube

Our Locations

  • India
    Pune | Mumbai | Hyderabad | Bengaluru | Nashik
  • USA
    Indianapolis | California | Dallas
Terms of Service Privacy Policy Copyright Varutra © 2024.