CALL US
+91 840 8891 911

Attacking Android Components - Content Providers

Attacking Android Components – Content Providers

In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What ...
Read More
Roadmap to FedRAMP Compliance

Roadmap to FedRAMP Compliance

The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server ...
Read More
Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR)

What is an Insecure Direct Object Reference (IDOR) Risk?  IDOR stands for Insecure Direct Object Reference occurring when an application ...
Read More
Port Forwarding - Pivoting and Tunneling

Port Forwarding – Pivoting and Tunneling

Port forwarding is a key activity in any network security testing. Once we get an initial foothold into the victim ...
Read More
IT Security Controls

IT Security Controls

IT security controls play a foundational role in shaping the efforts security professionals take to protect an organization. Security Controls ...
Read More
Adware – New Age Weapon

Adware – New Age Weapon

Are you seeing ads every time while browsing the web and it is asking you to install software or enter ...
Read More
Cyber Law in INDIA

Cyber Law in INDIA

In this article we will see in detail overview of Cyber Law in India and various sections of IT Act ...
Read More
Android Security Assessment Framework

DROZER – Android Security Assessment Framework

Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security ...
Read More
ASSET SECURITY

ASSET SECURITY

When we think of asset security, at the first glance it looks pretty simple. After all, what is the big ...
Read More
Covid 19 and Business Continuity Planning

Covid 19 and Business Continuity Planning

COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for ...
Read More
Essentials of Third Party Risk Management

Essentials of Third Party Risk Management (TPRM)

Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate ...
Read More
“OAuth” Related Vulnerabilities

“OAuth” Related Vulnerabilities

What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows ...
Read More
Sweet32 Birthday Attack Approach

Sweet32 Birthday Attack Approach

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32 ...
Read More
Second Order SQL Injection

SECOND ORDER SQL INJECTION ATTACK

Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know ...
Read More
Server-Side Template Injection

Server-Side Template Injection Vulnerability & Exploitation

In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting ...
Read More
Challenges Faced in IoT Security

Challenges Faced in IoT Security

What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each ...
Read More