CALL US
+91 840 8891 911
E-MAIL
contact@infosharesystems.com

Brand Reputaion and Security Implications

Brand Reputation

Image source: https://www.agilecrm.com Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by ...
Read More
Deception Technology

Deception Technology: The Art of Recording Cyber Attacks

Introduction:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets and divert them ...
Read More
Zero Trust Maturity Model

Zero Trust Maturity Model

What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the ...
Read More
Threat Hunting & Threat Intelligence

Threat Hunting & Threat Intelligence

Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and ...
Read More
Check stock api Request

Open Redirect

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes ...
Read More
CRLF Injection

CRLF Injection

Before going into details on what and how to find and perform CRLF injection and what are the measure one ...
Read More
AWS - Pentesting

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS environments, and many more. To ...
Read More
Setting up the Malware Analysis Lab

MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)

In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and ...
Read More
HTTP Parameter Pollution

HTTP Parameter Pollution

The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to ...
Read More
Websocket Overview

WebSocket Overview

What is a WebSocket? WebSocket is a Client-Server Communication protocol initiated over HTTP. WebSockets are used where there is continuous ...
Read More
Information Security Management System (ISMS

Introduction to Information Security Management Systems (ISMS)

What is an ISMS? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational ...
Read More
HTTP Request Smuggling

HTTP Request Smuggling

What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one ...
Read More
RISK Management

Risk Management

Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However, ...
Read More
CORS

Misconfigured Cross-Origin Resource Sharing (CORS) Risk

The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between ...
Read More
Database Configuration Audit for Security and Compliance

Database Configuration Audit for Security and Compliance [Part-1]

Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases to ...
Read More
JWT Attack

JWT Attack – Most Common Scenarios

What is a Json web token (JWT)? A JWTtoken is an open standard that defines the compact and secure way ...
Read More