Varutra Consulting Varutra Consulting Varutra Consulting
  • Toggle menu
  • Home 1
  • Company
    • About Us
    • Our Milestones
    • News
    • Events
  • Services
    • Cloud Security
    • Mobile Security
    • Application Security
    • Network Security
    • Virtual CISO (vCISO) Services
    • Audit & Compliance
    • Special Security Services
    • SOC & Global Threat Management Services
    • Information Security Maturity Assessment
    • Security Awareness Program0=-001
  • Regulatory Compliances
    • SEBI – CSCRF: Cyber Security
    • Bank (RBI Master Direction)
    • Cooperative Bank: RBI/2019-20/129 | DoS.CO/CSITE/BC.4083/31.01.052/2019-20
    • Events
  • Industry
  • Research
  • Resources
  • Training
  • Careers
  • Contact
Varutra Varutra Varutra
CALL US
+91 840 8891 911
E-MAIL
Contact Email
  • Home
  • Company
    • About Us
    • Our Milestones
    • News
    • Events
  • Services
    • Cloud Security
    • Mobile Security
    • Application Security
    • Network Security
    • Virtual CISO (vCISO) Services
    • Audit & Compliance
    • Special Security Services
    • SOC & Global Threat Management Services
    • Information Security Maturity Assessment
    • Security Awareness Program
  • Regulatory Compliances
    • Cooperative Bank: RBI/2019-20/129 | DoS.CO/CSITE/BC.4083/31.01.052/2019-20
  • Industry
  • Research
  • Resources
  • Training
    • SPARK program
    • Enquiry
  • Careers
  • Contact
Sweet32 Birthday Attack Approach

Sweet32 Birthday Attack Approach

by kalpblogger May 20, 2021

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32 birthday attack is found in…

Cyber Attack, Encryption & Cryptography, Web Application Security
Second Order SQL Injection

SECOND ORDER SQL INJECTION ATTACK

by kalpblogger May 13, 2021

Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know that these cannot be detected…

Vulnerability Disclosure, Web Application Security
Server-Side Template Injection

Server-Side Template Injection Vulnerability & Exploitation

by kalpblogger May 6, 2021

In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting into the details of SSTI…

Web Application Security
Challenges Faced in IoT Security

Challenges Faced in IoT Security

by kalpblogger April 29, 2021

What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each other over the internet. Today…

IOT Security
SOAR ( Security, Orchestration, Automation, and Response)

Security Orchestration Automation and Response (SOAR)

by kalpblogger April 22, 2021

Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle it adequately, most of the…

Android Security, Cloud Security, IOT Security, Security Best Practices
Brand Reputaion and Security Implications

Brand Reputation

by kalpblogger April 15, 2021

Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients, stakeholders, and the business groups….

Email Phishing, Social Engineering Attack, Social Networking Security, Web Application Security
Deception Technology

Deception Technology: The Art of Recording Cyber Attacks

by kalpblogger April 8, 2021

Introduction To Deception technology:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise’s true assets and divert them to a…

Security Advisory, Security Best Practices
Zero Trust Maturity Model

Zero Trust Maturity Model

by kalpblogger April 1, 2021

What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the organizational corporate network to be…

Security Best Practices, Zero Day Attack
Threat Hunting & Threat Intelligence

Threat Hunting & Threat Intelligence

by kalpblogger March 31, 2021

Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and activity logs are produced by…

Security Advisory

Open Redirect

by kalpblogger March 18, 2021

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes URLs to fail to authenticate…

Viruses & Malware, Vulnerability Disclosure, Web Application Security

Categories

  • Android Security (19)
  • Application security (1)
  • Authentication & Authorization (23)
  • Blockchain Security (1)
  • Bug Bounty (2)
  • BYOD (5)
  • Case Study (29)
  • Chatbot Security (1)
  • Cloud Security (14)
  • Containerization Security (1)
  • Corporate Training (6)
  • Cyber Attack (34)
  • Cybersecurity Frameworks and Solutions (3)
  • Data Breaches (35)
  • Data Leakage (27)
  • Data Privacy (29)
  • Email Phishing (8)
  • Encryption & Cryptography (14)
  • Ethical Hacking (19)
  • General (42)
  • Governance Risk & Compliance (8)
  • iOS Security (2)
  • IOT Security (7)
  • Java Security (2)
  • Mobile Application Security (19)
  • Mobile Device Management (10)
  • Network Pentesting (9)
  • News (48)
  • Password Security (10)
  • Past Events (8)
  • Patch Management (3)
  • Ransomware Attack (14)
  • Reverse Engineering (3)
  • Secure SDLC (5)
  • Security Advisory (34)
  • Security Best Practices (43)
  • Security Hardening (38)
  • Social Engineering Attack (10)
  • Social Networking Security (5)
  • Source Code Review (2)
  • SPAM (2)
  • Student Oriented Courses (2)
  • Thick Client Penetration Testing (4)
  • Unix/Linux Security (1)
  • Upcoming Events (3)
  • Viruses & Malware (16)
  • VoIP Penetration Testing (4)
  • Vulnerability Disclosure (21)
  • Web Application Security (34)
  • Windows Mobile Security (1)
  • Zero Day Attack (8)
Varutra Footer Logo

Quick Links

  • Home
  • Awards & Honours
  • Testimonials
  • Success Stories
  • Careers
  • Blog
  • Case Studies

Services

  • Cloud Security
  • Mobile Security
  • Application Security
  • Network Security
  • Audit & Compliance
  • Special Security Services
  • SOC & Global Threat Management Services
  • Information Security Maturity Assessment
  • Security Awareness Program
  • Training & Education

Contact

  • Phone
    +91 840 8891 911
  • Email Contact Us
  • Varutra Twitter
  • Varutra Facebook
  • Varutra Linkedin
  • Varutra Instagram
  • Varutra Youtube

Our Locations

  • India
    Pune | Mumbai | Hyderabad | Bengaluru | Nashik
  • USA
    Indianapolis | California | Dallas
Terms of Service Privacy Policy Copyright Varutra © 2024.