CALL US
+91 840 8891 911

phishing-emails-1-1

Security Advisory – Email Phishing

In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted ...
Read More
TYPOSQUATTING

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the ...
Read More
Office-365

Best Practices to Harden Office 365

1. Password Policy It is always recommended to use a strong password policy to help secure the data and service ...
Read More
Ransomware-attack-December-2018

Security Advisory – Ransomware Attack Targeting China – December 2018

1. Ransomware through Supply Chain Attack: A new ransomware strain spreading as a result of supply chain attack targeting Chinese ...
Read More
Tecnimont

Security Advisory – Tecnimont Cyber Theft

Background: Maire Tecnimont SpA is the parent company of the Italian group Maire Tecnimont, which consists of at least 50 ...
Read More
saipem

Security Advisory – Saipem Cyber Attack by Shamoon Malware

1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had primarily affected its servers in the ...
Read More
vcf-file-3 (1)

Microsoft Zero Day – VCard Vulnerability

Introduction: A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system. Under a certain scenario it ...
Read More
chatboat - Copy

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate ...
Read More
security 1

Blockchain Security – Part 1

Blockchain History The core ideas behind blockchain technology emerged in the late 1980s and early 1990s. In 1989, Leslie Lamport ...
Read More
Sec-Testing

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the ...
Read More
BO650X305

Introduction to Internet of Things (IoT)

Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorised use, ...
Read More
java desc

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are ...
Read More
mega blog

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company ...
Read More
aaaaaaaaaaaaaaaaaaa

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction A previously unknown zero-day vulnerability has been disclosed in the Microsoft's Windows operating system that could help a local ...
Read More
hqdefault-1

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the ...
Read More
transformers-2007-06

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration ...
Read More