Encryption & Cryptography

What to Expect When You’ve Been Hit with Ransomware?

Ransomware is malicious software or malware that gains access to the system, denies you any admission to your network, system,…

2 years ago

5 Concerning Cyberattacks to Watch Out for in 2022

Introduction  Technologies are evolving continuously, and we are primarily dependent on them. They make our day-to-day life easier, but they…

2 years ago

ISO 27017- Information Security Control for Cloud Services

The use of cloud services is increasing worldwide as industries continue to grow. With this dynamic growth in cloud technology,…

3 years ago

Sweet32 Birthday Attack Approach

In this blog, we are going to understand one of the TLS/SSL attacks i.e., Sweet32 Birthday Attack Approach. Mostly Sweet32…

3 years ago

Zero Knowledge Proof

Introduction Looking for something exciting and a secure way to protect your secrets? Zero Knowledge Proof Protocol has the potential…

5 years ago

Code Obfuscation

Abstract In this paper, we came up with a basic understanding of Code Obfuscation - A Code Protection Technology which…

5 years ago

Best Practices to Harden Office 365

Here are some best practices to harden office 365 and ensure your data remains protected. 1. Password Policy It is…

5 years ago

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

5 years ago

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

6 years ago