CALL US
+91 840 8891 911

Json web token JWT Attack

Json web token (JWT) Attack – Most Common Scenarios

What is a JSON web token (JWT)? A JSON web token (JWT) token is an open standard which defines the ...
Read More
PA-DSS Expires by 2022

PA DSS V 3.2 to SUNSET by 2022

About PA DSS Formerly known as the Payment Application Best Practices (PABP), the Payment Application Data Security Standard (PA-DSS) is ...
Read More
PRIVACY now to be a fundamental right in INDIA

Privacy Now to be a Fundamental Right in India

Electronic data protection in India is currently governed by the Indian penal code, the information Technology Act 2000 – IT ...
Read More
A

How we are successfully managing & delivering the Cybersecurity Services during COVID-19 situation?

By now, we all already went through COVID pandemic’s first wave. The second wave has started hitting the world. Though ...
Read More
Web Cache Poisoning – Through Host Header Injectio

Web Cache Poisoning – Through Host Header Injection

Web cache poisoning is an advanced hacking technique through which an attacker can exploit the pattern or behavior of a ...
Read More
Apache Struts-2 Exploited to Remote Code Execution

Apache Struts-2 Exploited to Remote Code Execution

This blog is to describe my finding on a web-based application which is a very well-known vulnerability found on Apache ...
Read More
Subdomain takeover

Subdomain Takeovers – CNAMEs And Cloud Services

Introduction A Subdomain Takeovers A hostile takeover of a subdomain by an attacker is known as a subdomain takeover. This ...
Read More
Threat Modelling - Focused Defence for Modern Enterprises

Threat Modelling – Focused Defence for Modern Enterprises

Threat modeling is creating a buzz that everyone wants to talk about it. Every organization wants to remodel its overhaul ...
Read More
Zooming Security Vulnerabilities

Zooming Security Vulnerabilities [Part – 2]

This blog article will cover security best practices in setting up Zoom meetings securely to avoid Zooming Security Vulnerabilities! 1 ...
Read More
Zooming Security Vulnerabilities

Zooming Security Vulnerabilities [Part – 1]

Diving into Zoom Security Vulnerabilities [Part – 1] Introduction - Zoom is a popular web-based video-conferencing application available to be ...
Read More
Maze

Organizations Hit by Maze Ransomware Attack !!

Introduction to Maze Ransomware - Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered ...
Read More
Containerization-and-it’s-Impact-on-Enterprise-Security

Containerization and It’s Impact on Enterprise Security

What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about ...
Read More
Joanap and Brambul Malware

Joanap and Brambul Malware

Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last ...
Read More
Zero Blog - Copy

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential ...
Read More
formjakking

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat ...
Read More
image

Best Practices – BYOD and Mobile Device Security

BYOD (Bring Your Own Device) is a practice where employees can bring their own devices such as laptops, tablets or ...
Read More