CALL US
+91 840 8891 911
E-MAIL
contact@infosharesystems.com

Formjacking - The New Favourite Cyber Crooks Hack

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat ...
Read More
Best Practices - BYOD and Mobile Device Security

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) BYOD (Bring Your Own Device) is a practice where employees can bring their own devices ...
Read More
Code Obfuscation

Code Obfuscation

Abstract In this paper, we came up with a basic understanding of Code protection technologies which need anti-reverse engineering transformations ...
Read More
Vulnerabilities Related to SAML [Security Assertion Markup Language] – Part 1

Vulnerabilities Related to SAML [Security Assertion Markup Language] – Part 1

In this blog, we are going to discuss about what is the SAML(Security Assertion Markup Language) and how it works ...
Read More
Security Advisory - Email Phishing

Security Advisory – Email Phishing

In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted ...
Read More
Security Advisory - Typosquatting

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the ...
Read More
Best Practices to Harden Office 365

Best Practices to Harden Office 365

1. Password Policy It is always recommended to use a strong password policy to help secure the data and service ...
Read More
Security Advisory - Ransomware Attack Targeting China - December 2018

Security Advisory – Ransomware Attack Targeting China – December 2018

1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a result of supply chain attack targeting Chinese ...
Read More
Security Advisory - Tecnimont Cyber Theft

Security Advisory – Tecnimont Cyber Theft

Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 ...
Read More
Security Advisory - Saipem Cyber Attack by Shamoon Malware

Security Advisory – Saipem Cyber Attack by Shamoon Malware

1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had primarily affected its servers in the ...
Read More
Microsoft Zero Day - VCard Vulnerability

Microsoft Zero Day – VCard Vulnerability

Introduction: A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system. Under a certain scenario it ...
Read More
The Art of Communication, Interpretation & Validation: ChatBots

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate ...
Read More
Blockchain Security - Part 1

Blockchain Security – Part 1

Blockchain History The core ideas behind blockchain technology emerged in the late 1980s and early 1990s. In 1989, Leslie Lamport ...
Read More
Web Services Security Testing

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the ...
Read More
Introduction to Internet of Things (IoT)

Introduction to Internet of Things (IoT)

Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorised use, ...
Read More
Case Study - New way to Exploit Java Deserialization Vulnerability

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are ...
Read More