+91 840 8891 911
Audit & Compliance
Special Security Services
SOC & Global Threat Management Services
Information Security Maturity Assessment
Read our insights into cyber security from security SMEs!
Authentication & Authorization
Encryption & Cryptography
Governance Risk & Compliance
Mobile Application Security
Mobile Device Management
Security Best Practices
Social Engineering Attack
Social Networking Security
Source Code Review
Student Oriented Courses
Thick Client Penetration Testing
Viruses & Malware
VoIP Penetration Testing
Web Application Security
Windows Mobile Security
Zero Day Attack
Attacking Android Components – Content Providers
In this blog, I’ll be showing you how we can exploit the Attacking Android Components based content providers vulnerability. What ...
Roadmap to FedRAMP Compliance
The basic layman’s concept behind cloud computing technology is that the user does not need to physically manage any server ...
Insecure Direct Object Reference (IDOR)
What is an Insecure Direct Object Reference (IDOR) Risk? IDOR stands for Insecure Direct Object Reference occurring when an application ...
Port Forwarding – Pivoting and Tunneling
Port forwarding is a key activity in any network security testing. Once we get an initial foothold into the victim ...
IT Security Controls
IT security controls play a foundational role in shaping the efforts security professionals take to protect an organization. Security Controls ...
Adware – New Age Weapon
Are you seeing ads every time while browsing the web and it is asking you to install software or enter ...
Cyber Law in INDIA
In this article we will see in detail overview of Cyber Law in India and various sections of IT Act ...
DROZER – Android Security Assessment Framework
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security ...
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big ...
Covid 19 and Business Continuity Planning
COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for ...
Essentials of Third Party Risk Management (TPRM)
Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate ...
“OAuth” Related Vulnerabilities
What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows ...
Sweet32 Birthday Attack Approach
In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32 ...
SECOND ORDER SQL INJECTION ATTACK
Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know ...
Server-Side Template Injection Vulnerability & Exploitation
In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting ...
Challenges Faced in IoT Security
What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each ...