Case Study

The Ripple Effect of Supply Chain Attacks on Global Commerce

In today's globalized world, supply chains are the backbone of commerce, connecting businesses across continents. But what happens when those…

1 year ago

Security Advisory – Typosquatting

There are multiple cases of redirect which are due to typing mistake (typos) from the users which leads to the…

5 years ago

The Art of Communication, Interpretation & Validation: ChatBots

“Hello Alexa, may I have a strategy to test you? “   What is ChatBot? A computer program designed to…

5 years ago

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

5 years ago

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

5 years ago

Introduction to Internet of Things (IoT)

Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…

6 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

6 years ago

Thick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution

Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the…

6 years ago