Password Spraying Attacks: Detecting and Preventing Credential-Based Threats
In today’s interconnected world, where cybersecurity is of paramount importance, password security plays a crucial role in protecting sensitive information. However, cybercriminals are constantly devising…
Access Control Vulnerabilities
This blog aims to understand and demonstrate different access control vulnerabilities. The flow here will start with the theoretical explanation of what access control is…
Importance of Biometrics in Cybersecurity
Introduction Cybersecurity refers to safeguarding the systems, networks, and applications against digital attacks intended to gain access to, alter, or delete sensitive data, extort money…
Code Injection Vulnerabilities
Introduction to Code Injection Vulnerabilities Code injection is an attack where the attacker tries to inject a code that can be interpreted and executed by…
Increased use of Multi-factor Authentication
What is Multi-Factor Authentication (MFA)? Multi-Factor Authentication (MFA) refers to an authentication method that necessitates the user to provide more than one verification factor for…
Antivirus Evasion – Part 1
1. Antivirus – The Basics Antivirus software helps to protect against various computer infections by detecting malicious software, often referred to as malware, on your…
ASSET SECURITY
When we think of asset security, at the first glance it looks pretty simple. After all, what is the big deal about tracking a few…
Introduction to Information Security Management System (ISMS)
What is an Information Security Management System ? An Information Security Management System (ISMS) is a set of policies and procedures for managing organizational confidential…
Better Secure Than Sorry! Neglected, Assumed and Hence Vulnerable Menace: Password Attacks
On July 16, 1998, CERT reported an incident where an attacker had found 186,126 encrypted passwords. By the time they were discovered, they had already…
Hacking Google account through Locked Android Devices
Hacking Google account through Locked Android Devices Varutra revealed an issue in the text message notification implementation of Google’s Android operating system which may lead…
Categories
- Android Security (19)
- Application security (1)
- Authentication & Authorization (23)
- Blockchain Security (1)
- Bug Bounty (2)
- BYOD (5)
- Case Study (29)
- Chatbot Security (1)
- Cloud Security (14)
- Containerization Security (1)
- Corporate Training (6)
- Cyber Attack (34)
- Cybersecurity Frameworks and Solutions (3)
- Data Breaches (35)
- Data Leakage (27)
- Data Privacy (29)
- Email Phishing (8)
- Encryption & Cryptography (14)
- Ethical Hacking (19)
- General (42)
- Governance Risk & Compliance (8)
- iOS Security (2)
- IOT Security (7)
- Java Security (2)
- Mobile Application Security (19)
- Mobile Device Management (10)
- Network Pentesting (9)
- News (48)
- Password Security (10)
- Past Events (8)
- Patch Management (3)
- Ransomware Attack (14)
- Reverse Engineering (3)
- Secure SDLC (5)
- Security Advisory (34)
- Security Best Practices (43)
- Security Hardening (38)
- Social Engineering Attack (10)
- Social Networking Security (5)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (4)
- Unix/Linux Security (1)
- Upcoming Events (3)
- Viruses & Malware (16)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (21)
- Web Application Security (34)
- Windows Mobile Security (1)
- Zero Day Attack (8)