Subdomain Takeovers – CNAMEs And Cloud Servi ...
Introduction A Subdomain takeover, you guessed it – refers to the hostile takeover of a subdomain by an attacker. This vulnerability arises mainly when resources…
Read More Cloud Security 0
Containerization and It’s Impact on Enterprise S ...
What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about and every MNC is…
Read MoreWeb Services Security Testing ...
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the many people are using the…
Read MoreCategories
- Android Security (8)
- Authentication & Authorization (12)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (4)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (3)
- Company Events (1)
- Containerization Security (1)
- Corporate Training (4)
- Cyber Attack (9)
- Data Breaches (12)
- Data Leakage (15)
- Data Privacy (16)
- Email Phishing (3)
- Encryption & Cryptography (10)
- Ethical Hacking (11)
- General (2)
- iOS Security (2)
- IOT Security (2)
- Java Security (2)
- Mobile Application Security (11)
- Mobile Device Management (6)
- Network Pentesting (5)
- News (20)
- Password Security (3)
- Patch Management (3)
- Ransomware Attack (4)
- Reverse Engineering (3)
- Secure SDLC (3)
- Security Advisory (26)
- Security Best Practices (22)
- Security Hardening (19)
- Social Engineering Attack (5)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Viruses & Malware (11)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (19)
- Web Application Security (12)
- Webinar (1)
- Windows Mobile Security (1)
- Zero Day Attack (6)