
Brand Reputation
Image source: https://www.agilecrm.com Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by ...
Read More
Read More

Deception Technology: The Art of Recording Cyber Attacks
Introduction: Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets and divert them ...
Read More
Read More

Zero Trust Maturity Model
What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the ...
Read More
Read More

Threat Hunting & Threat Intelligence
Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and ...
Read More
Read More

Open Redirect
What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes ...
Read More
Read More

CRLF Injection
Before going into details on what and how to find and perform CRLF injection and what are the measure one ...
Read More
Read More

AWS Pentesting – Part – 1
Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS environments, and many more. To ...
Read More
Read More

MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)
In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and ...
Read More
Read More

HTTP Parameter Pollution
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to ...
Read More
Read More

WebSocket Overview
What is a WebSocket? WebSocket is a Client-Server Communication protocol initiated over HTTP. WebSockets are used where there is continuous ...
Read More
Read More

Introduction to Information Security Management Systems (ISMS)
What is an ISMS? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational ...
Read More
Read More

HTTP Request Smuggling
What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one ...
Read More
Read More

Risk Management
Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However, ...
Read More
Read More

Misconfigured Cross-Origin Resource Sharing (CORS) Risk
The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between ...
Read More
Read More

Database Configuration Audit for Security and Compliance [Part-1]
Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to ...
Read More
Read More

JWT Attack – Most Common Scenarios
What is a Json web token (JWT)? A JWTtoken is an open standard that defines the compact and secure way ...
Read More
Read More