
JWT Attack – Most Common Scenarios
What is a Json web token (JWT)? A JWTtoken is an open standard that defines the compact and secure way ...
Read More
Read More

PA DSS V 3.2 to SUNSET by 2022
About PA DSS The Payment Application Data Security Standard (PA-DSS), formerly referred to as the Payment Application Best Practices (PABP), ...
Read More
Read More

PRIVACY Now To Be a Fundamental Right in INDIA
Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT ...
Read More
Read More

How we are successfully managing & delivering the Cybersecurity Services during COVID-19 situation?
By now we all have already gone through the COVID pandemic’s first wave now the second wave started hitting all ...
Read More
Read More

Web Cache Poisoning – Through Host Header Injection
To understand the concept of web cache poisoning first we have to understand what web cache is and why it ...
Read More
Read More

Apache Struts-2 Exploited to Remote Code Execution
This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache ...
Read More
Read More

Subdomain Takeovers – CNAMEs And Cloud Services
Introduction A Subdomain takeover, you guessed it - refers to the hostile takeover of a subdomain by an attacker. This ...
Read More
Read More

Threat Modelling – Focused Defence for Modern Enterprises
Threat ModellingThreat modelling is the latest buzz word everyone is talking about and every organization wants to revamp their information ...
Read More
Read More
![Zooming Security Vulnerabilities [Part – 2]](https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_1200,h_600/https://www.varutra.com/wp-content/uploads/2020/05/intro-2-wpp1596605589300.png)
Zooming Security Vulnerabilities [Part – 2]
Securely Hosting Zoom Meetings This blog article will cover security best practices in setting up Zoom meetings securely! 1. Ensure ...
Read More
Read More
![Zooming Security Vulnerabilities [Part – 1]](https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_1100,h_600/https://www.varutra.com/wp-content/uploads/2020/04/header1-Copy.jpg)
Zooming Security Vulnerabilities [Part – 1]
Diving into Zoom Security Vulnerabilities [Part – 1] Introduction - Zoom is a popular web-based video conferencing application available to ...
Read More
Read More

Organizations Hit by Maze Ransomware Attack !!
Introduction - Maze, also known as ChaCha, is a ransomware that had been first discovered in the month of May ...
Read More
Read More

Containerization and It’s Impact on Enterprise Security
What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about ...
Read More
Read More

Joanap and Brambul Malware
Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last ...
Read More
Read More

Zero Knowledge Proof
Introduction Looking for something exciting and a secure way to protect your secrets? Zero-Knowledge Protocol has the potential to increase ...
Read More
Read More

Formjacking – The New Favourite Cyber Crooks Hack
“We are in the most popular world of – Black hat hacker” What is Formjacking Attack? The year's rampant threat ...
Read More
Read More

Best Practices – BYOD and Mobile Device Security
BYOD (Bring Your Own Device) BYOD (Bring Your Own Device) is a practice where employees can bring their own devices ...
Read More
Read More