+91 840 8891 911


Security Advisory – Saipem Cyber Attack by Shamoon Malware

Saipem Cyber Attack by Shamoon Malware 1. Introduction Saipem identified cyber-attack on Monday i.e. on 10th December 2018 that had ...
Read More
vcf-file-3 (1)

Microsoft Zero Day – VCard Vulnerability

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction ...
Read More
chatboat - Copy

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate ...
Read More
security 1

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it ...
Read More

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the ...
Read More

Introduction to Internet of Things (IoT)

Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set ...
Read More
java desc

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are ...
Read More
mega blog

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company ...
Read More

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating ...
Read More
Java Deserialization

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the ...
Read More

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration ...
Read More
Petya_Banner (1)

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that ...
Read More
image (1)

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more android ransomware - ...
Read More
Buffer overflow - Copy

Buffer Overflow Attacks

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in ...
Read More
threat Advisory - Copy

Threat Advisory Report on WannaCry Ransomware (Critical Severity)

Here we will discuss Threat Advisory Report on WannaCry Ransomware (Critical Severity). 1. Introduction On Friday, May 12, countless organizations ...
Read More

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause ...
Read More