7 Top Trends in Cybersecurity for 2022 ...
The world is getting accustomed to digitalization, and the organization’s digital footprint is trending in cybersecurity for 2022. In short, these trends focus on: How…
Read More5 Concerning Cyberattacks to Watch Out for in 2022 ...
Introduction Technologies are evolving continuously, and we are primarily dependent on them. They make our day-to-day life easier, but they are also more prone to…
Read MoreExploit Kits: Attackers Preferred Exploitation Too ...
Exploit Kits: Overview Cybercrime was once the domain of a tiny handful of people with excellent technical skills who leveraged their abilities for malicious acts….
Read MorePenetration Testing Using Metasploit Framework ...
Metasploit Framework is a powerful open-source penetration testing framework. You get to know all the information about penetration testing, IDS signature, and software vulnerabilities. It…
Read MoreExternal Penetration Testing – Case Study ...
ABSTRACT External Penetration Testing consists of a reviewing and assessing the vulnerabilities that could be exploited by external users/Hacker without any credentials or without having…
Read MoreVoIP Penetration Testing Part – IV ...
In the previous tutorial VoIP Penetration Testing Part – III we have learnt about SIP User extension enumeration. This is the last article in…
Read MoreCSRF Vulnerability on LinkedIn ...
In previous blog we have seen a critical vulnerability in LinkedIn password reset module allowing an attackers to compromise LinkedIn user’s account and how helpless…
Read MoreVoIP Penetration Testing Part – III ...
In the previous tutorial VoIP Penetration Testing Part-II we have learnt on how to do scanning against VoIP Server. In this tutorial we will configure…
Read MoreVoIP Penetration Testing Part-II ...
In the previous tutorial VoIP Penetration Testing Part-I we have learnt on how to do Information Gathering/ Footprinting using Google dorks and identify the target…
Read MoreVoIP Penetration Testing Part -I ...
Abstract Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either…
Read MoreCategories
- Android Security (17)
- Authentication & Authorization (21)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (5)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (11)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (25)
- Data Breaches (27)
- Data Leakage (24)
- Data Privacy (26)
- Email Phishing (7)
- Encryption & Cryptography (13)
- Ethical Hacking (15)
- General (14)
- Governance Risk & Compliance (6)
- iOS Security (2)
- IOT Security (5)
- Java Security (2)
- Mobile Application Security (18)
- Mobile Device Management (10)
- Network Pentesting (8)
- News (47)
- Password Security (8)
- Past Events (6)
- Patch Management (3)
- Ransomware Attack (10)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (29)
- Security Best Practices (33)
- Security Hardening (31)
- Social Engineering Attack (9)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (3)
- Unix/Linux Security (1)
- Upcoming Events (1)
- Viruses & Malware (14)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (32)
- Windows Mobile Security (1)
- Zero Day Attack (7)