
MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)
In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and ...
Read More
Read More

HTTP Parameter Pollution
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to ...
Read More
Read More

WebSocket Overview
What is a WebSocket? WebSocket is a Client-Server Communication protocol initiated over HTTP. WebSockets are used where there is continuous ...
Read More
Read More

Introduction to Information Security Management Systems (ISMS)
What is an ISMS? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational ...
Read More
Read More

HTTP Request Smuggling
What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one ...
Read More
Read More

Risk Management
Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However, ...
Read More
Read More

Misconfigured Cross-Origin Resource Sharing (CORS) Risk
The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between ...
Read More
Read More

Database Configuration Audit for Security and Compliance [Part-1]
Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to ...
Read More
Read More

JWT Attack – Most Common Scenarios
What is a Json web token (JWT)? A JWTtoken is an open standard that defines the compact and secure way ...
Read More
Read More

PA DSS V 3.2 to SUNSET by 2022
About PA DSS The Payment Application Data Security Standard (PA-DSS), formerly referred to as the Payment Application Best Practices (PABP), ...
Read More
Read More

PRIVACY Now To Be a Fundamental Right in INDIA
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT ...
Read More
Read More

How we are successfully managing & delivering the Cybersecurity Services during COVID-19 situation?
By now we all have already gone through the COVID pandemic’s first wave now the second wave started hitting all ...
Read More
Read More

Web Cache Poisoning – Through Host Header Injection
To understand the concept of web cache poisoning first we have to understand what web cache is and why it ...
Read More
Read More

Apache Struts-2 Exploited to Remote Code Execution
This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache ...
Read More
Read More

Subdomain Takeovers – CNAMEs And Cloud Services
Introduction A Subdomain takeover, you guessed it - refers to the hostile takeover of a subdomain by an attacker. This ...
Read More
Read More

Threat Modelling – Focused Defence for Modern Enterprises
Threat ModellingThreat modelling is the latest buzz word everyone is talking about and every organization wants to revamp their information ...
Read More
Read More