
Cyber Law in INDIA
In this article we will see in detail overview of Cyber Law in India and various sections of IT Act ...
Read More
Read More

DROZER – Android Security Assessment Framework
Drozer is a framework for Android security assessments developed by MWR Labs. It is one of the best Android security ...
Read More
Read More

ASSET SECURITY
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big ...
Read More
Read More

Covid 19 and Business Continuity Planning
COVID – 19 Initial Precautionary Measures for Business Continuity Basic Emergency measures for Covid-19 Pandemic to Avoid Cyber Risks for ...
Read More
Read More

Essentials of Third Party Risk Management (TPRM)
Risk management is the process of carrying out evaluative decisions based on analytics and calculations that will ensure to mitigate ...
Read More
Read More

“OAuth” Related Vulnerabilities
What is OAuth? OAuth is a mechanism that is used by many companies like Amazon, Google, Microsoft, etc., which allows ...
Read More
Read More

Sweet32 Birthday Attack Approach
In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32 ...
Read More
Read More

SECOND ORDER SQL INJECTION ATTACK
Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know ...
Read More
Read More

Server-Side Template Injection Vulnerability & Exploitation
In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting ...
Read More
Read More

Challenges Faced in IoT Security
What is IoT? IoT Internet of thing is a network of the devices, things, sensors which are interconnected with each ...
Read More
Read More

Security Orchestration Automation and Response (SOAR)
Cybersecurity Synopsis For almost every organization, either large or small-scale, performing incident response is an endless job and to tackle ...
Read More
Read More

Brand Reputation
Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients, ...
Read More
Read More

Deception Technology: The Art of Recording Cyber Attacks
Introduction To Deception technology: Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets ...
Read More
Read More

Zero Trust Maturity Model
What is Zero Trust? Zero Trust is a Cybersecurity terminology that requires all users even those who are inside the ...
Read More
Read More

Threat Hunting & Threat Intelligence
Overview: Every day, a large amount of data is produced by organizations in the modern world. Network traffic, activities, and ...
Read More
Read More

Open Redirect
What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes ...
Read More
Read More