Sweet32 Birthday Attack Approach
In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32 birthday attack is found in…
SECOND ORDER SQL INJECTION ATTACK
Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know that these cannot be detected…
Server-Side Template Injection Vulnerability & Exploitation
In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting into the details of SSTI…
Challenges Faced in IoT Security
What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each other over the internet. Today…
Security Orchestration Automation and Response (SOAR)
Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle it adequately, most of the…
Brand Reputation
Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients, stakeholders, and the business groups….
Deception Technology: The Art of Recording Cyber Attacks
Introduction To Deception technology: Deception technology is a newest strategy to attract cyber criminals away from an enterprise’s true assets and divert them to a…
Zero Trust Maturity Model
What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the organizational corporate network to be…
Threat Hunting & Threat Intelligence
Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and activity logs are produced by…
Open Redirect
What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes URLs to fail to authenticate…
Categories
- Android Security (19)
- Authentication & Authorization (22)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (1)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (34)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (42)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)