CALL US
+91 840 8891 911

Covid 19 and Business Continuity Planning

Covid 19 and Business Continuity Planning

COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic Follow Government/WHO guideline Follow your ...
Read More
Essentials of Third Party Risk Management

Essentials of Third Party Risk Management (TPRM)

Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate ...
Read More
“OAuth” Related Vulnerabilities

“OAuth” Related Vulnerabilities

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows ...
Read More
Sweet32 Birthday Attack Approach

Sweet32 Birthday Attack Approach

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack. Mostly Sweet32 birthday ...
Read More
Second Order SQL Injection

SECOND ORDER SQL INJECTION ATTACK

Second Order SQL Injection: Second Order SQL Injections are those which are not widely discussed. Important to know that these ...
Read More
Server-Side Template Injection

Server-Side Template Injection Vulnerability & Exploitation

In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting ...
Read More
Challenges Faced in IoT Security

Challenges Faced in IoT Security

What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each ...
Read More
SOAR ( Security, Orchestration, Automation, and Response)

Security Orchestration Automation and Response (SOAR)

Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle ...
Read More
Brand Reputaion and Security Implications

Brand Reputation

Image source: https://www.agilecrm.com Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by ...
Read More
Deception Technology

Deception Technology: The Art of Recording Cyber Attacks

Introduction:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets and divert them ...
Read More
Zero Trust Maturity Model

Zero Trust Maturity Model

What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the ...
Read More
Threat Hunting & Threat Intelligence

Threat Hunting & Threat Intelligence

Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and ...
Read More
Check stock api Request

Open Redirect

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes ...
Read More
CRLF Injection

CRLF Injection

Before going into details on what and how to find and perform CRLF injection and what are the measure one ...
Read More
AWS - Pentesting

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS environments, and many more. To ...
Read More
Setting up the Malware Analysis Lab

MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)

In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and ...
Read More