![Vulnerabilities Related to SAML [Security Assertion Markup Language] – Part 1](https://cdn.shortpixel.ai/client/q_glossy,ret_img,w_1230,h_700/https://www.varutra.com/wp-content/uploads/2019/02/SAML-Copy.png)
Vulnerabilities Related to SAML [Security Assertion Markup Language] – Part 1
In this blog, we are going to discuss about what is the SAML(Security Assertion Markup Language) and how it works ...
Read More
Read More

Security Advisory – Email Phishing
In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted ...
Read More
Read More

Security Advisory – Typosquatting
There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the ...
Read More
Read More

Best Practices to Harden Office 365
1. Password Policy It is always recommended to use a strong password policy to help secure the data and service ...
Read More
Read More

Security Advisory – Ransomware Attack Targeting China – December 2018
1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a result of supply chain attack targeting Chinese ...
Read More
Read More

Security Advisory – Tecnimont Cyber Theft
Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 ...
Read More
Read More

Security Advisory – Saipem Cyber Attack by Shamoon Malware
1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had primarily affected its servers in the ...
Read More
Read More

Microsoft Zero Day – VCard Vulnerability
Introduction: A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system. Under a certain scenario it ...
Read More
Read More

The Art of Communication, Interpretation & Validation: ChatBots
“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate ...
Read More
Read More

Blockchain Security – Part 1
Blockchain History The core ideas behind blockchain technology emerged in the late 1980s and early 1990s. In 1989, Leslie Lamport ...
Read More
Read More

Web Services Security Testing
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the ...
Read More
Read More

Introduction to Internet of Things (IoT)
Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorised use, ...
Read More
Read More

Case Study – New way to Exploit Java Deserialization Vulnerability
Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are ...
Read More
Read More

Security Advisory- MEGA Chrome Extension Hijack
What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company ...
Read More
Read More

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability
Introduction A previously unknown zero-day vulnerability has been disclosed in the Microsoft's Windows operating system that could help a local ...
Read More
Read More

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution
Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the ...
Read More
Read More