+91 840 8891 911
Audit & Compliance
Special Security Services
SOC & Global Threat Management Services
Information Security Maturity Assessment
Security Awareness Program
Read our insights into cyber security from security SMEs!
Authentication & Authorization
Encryption & Cryptography
Governance Risk & Compliance
Mobile Application Security
Mobile Device Management
Security Best Practices
Social Engineering Attack
Social Networking Security
Source Code Review
Student Oriented Courses
Thick Client Penetration Testing
Viruses & Malware
VoIP Penetration Testing
Web Application Security
Windows Mobile Security
Zero Day Attack
Let’s Protect Your Organization From Insider Threats
Among various cyber threats that organizations face, insider threats are the ones that are hard to detect. However, not all ...
STATIC ANALYSIS OF ANDROID APPLICATION
Android applications are now an integral part of our lives, thanks to the excessive use of mobile phones. However, many ...
Learning About Web Application Firewall (WAF) Security
Introduction of Web Application Firewall (WAF) Security A web application firewall (WAF) is a security solution that provides rule sets ...
HIPAA Compliance Framework – A Guide for Implementation
The Health Insurance Portability and Accountability Act (HIPAA) has set the standard for sensitive and critical patient healthcare data protection ...
Increased use of Multi-factor Authentication
What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) refers to an authentication method that necessitates the user to provide more ...
Android Penetration Testing with Drozer
Introduction to Android Application Security Testing Framework - Drozer: Drozer is an android application security testing framework which is developed ...
Antivirus Evasion – Part 1
1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred ...
All you need to know about Android WebView Vulnerabilities
In this blog we are going to understand about Android WebView Vulnerabilities. What is WebView ? The WebView class in ...
Guide to Identity & Access Management (IAM)
Introduction to Identity and Access Management Identity and Access Management (IAM) defines user identities and permissions. It encompasses the provisioning ...
Ransomware and the measures to safeguard an organisation
Ransomware Attack and Its Prevention We are all aware of ransomware, as most of us, or at least someone in ...
Intro to GraphQL – Attack Scenarios
Introduction GraphQL is one of the commonly used open-source manipulation and data query language for APIs, and runtime for implementing ...
Mitigating Cross-Site Request Forgery (CSRF) Attacks
What is Cross-Site Request Forgery (CSRF)? Cross-Site Request Forgery (CSRF) is a widely known web security vulnerability that enables a ...
WEB CACHE DECEPTION
Introduction: A security researcher, Mr. Omer Gil initially proposed Web cache deception attack in 2017. This attack takes advantage of ...
Attacking Android Components – Content Providers
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What ...
Roadmap to FedRAMP Compliance
The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server ...
Insecure Direct Object Reference (IDOR)
What is an Insecure Direct Object Reference (IDOR) Risk? IDOR stands for Insecure Direct Object Reference occurring when an application ...