CALL US
+91 840 8891 911
E-MAIL
contact@varutra.com

Microsoft Zero Day – VCard Vulnerability

Introduction: A zero-day vulnerability has been discovered and reported in the Microsoft's Windows operating system. Under a certain scenario it ...
Read More

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “ What is ChatBot? A computer program designed to simulate ...
Read More

Blockchain Security – Part 1

Blockchain History The core ideas behind blockchain technology emerged in the late 1980s and early 1990s. In 1989, Leslie Lamport ...
Read More

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the ...
Read More

Introduction to Internet of Things (IoT)

Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorised use, ...
Read More

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are ...
Read More

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company ...
Read More

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction A previously unknown zero-day vulnerability has been disclosed in the Microsoft's Windows operating system that could help a local ...
Read More

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the ...
Read More

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration ...
Read More

Threat Advisory Report on Petya Ransomware (Critical Severity)

Ransomware: An Introduction Ransomware is a form of malicious software that locks up users files on the computer system, encrypts ...
Read More

Beware Android Users – CLOAK AND DAGGER is here to exploit you

The WORLD has still not got over with the WannaCry ransomware menace and here comes one more! People have been ...
Read More

Buffer Overflow Attacks

Introduction Buffer is a storage place in memory where data can be stored. It’s mostly bound in a conditional statements ...
Read More

Threat Advisory Report on WannaCry Ransomware (Critical Severity)

1. Introduction On Friday, May 12, countless organizations around the world began fending off attacks from a ransomware strain variously ...
Read More

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to provide a guideline for secure software development. Easily avoided software defects are a ...
Read More

Mobile Vulnerability Database (MVD)

Introduction: The Android operating system is the most widely used operating system for mobile devices. Android has around 82.8% (IDC) ...
Read More