Threat Modelling – Focused Defence for Moder ...
Threat ModellingThreat modelling is the latest buzz word everyone is talking about and every organization wants to revamp their information to produce a prioritized list…
Read MoreZooming Security Vulnerabilities [Part – 2] ...
Securely Hosting Zoom Meetings This blog article will cover security best practices in setting up Zoom meetings securely! 1. Ensure the Host can manage Screen…
Read MoreZooming Security Vulnerabilities [Part – 1] ...
Diving into Zoom Security Vulnerabilities [Part – 1] Introduction – Zoom is a popular web-based video conferencing application available to be installed on computer systems…
Read MoreOrganizations Hit by Maze Ransomware Attack !! ...
Introduction – Maze, also known as ChaCha, is a ransomware that had been first discovered in the month of May 2019. Maze ransomware is a sophisticated…
Read MoreContainerization and It’s Impact on Enterprise S ...
What’s this “D” word everyone is talking about? Oh.. you mean Docker!! The latest buzz word everyone is talking about and every MNC is…
Read MoreJoanap and Brambul Malware ...
Joanap and Brambul Malware has come from North Korea that has infected numerous Microsoft Windows computers globally over the last decade. On 30th January 2019 United…
Read MoreZero Knowledge Proof ...
Introduction Looking for something exciting and a secure way to protect your secrets? Zero-Knowledge Protocol has the potential to increase privacy and security in the…
Read MoreFormjacking – The New Favourite Cyber Crooks ...
“We are in the most popular world of – Black hat hacker” What is Formjacking Attack? The year’s rampant threat in cybersecurity is Formjacking. It…
Read MoreVulnerabilities Related to SAML [Security Assertio ...
In this blog, we are going to discuss about what is the SAML(Security Assertion Markup Language) and how it works as well as we are…
Read MoreSecurity Advisory – Email Phishing ...
In today’s era, email is still used as one of the primary ways to communicate, which is not only restricted to our everyday work…
Read MoreCategories
- Android Security (8)
- Authentication & Authorization (12)
- Blockchain Security (1)
- Bug Bounty (1)
- BYOD (4)
- Case Study (28)
- Chatbot Security (1)
- Cloud Security (3)
- Containerization Security (1)
- Corporate Training (4)
- Cyber Attack (9)
- Data Breaches (11)
- Data Leakage (14)
- Data Privacy (15)
- Email Phishing (2)
- Encryption & Cryptography (10)
- Ethical Hacking (11)
- General (1)
- iOS Security (2)
- IOT Security (2)
- Java Security (2)
- Mobile Application Security (11)
- Mobile Device Management (6)
- Network Pentesting (5)
- Password Security (2)
- Patch Management (3)
- Ransomware Attack (4)
- Reverse Engineering (3)
- Secure SDLC (3)
- Security Advisory (24)
- Security Best Practices (19)
- Security Hardening (19)
- Social Engineering Attack (4)
- Social Networking Security (4)
- Source Code Review (2)
- SPAM (2)
- Student Oriented Courses (2)
- Thick Client Penetration Testing (2)
- Unix/Linux Security (1)
- Viruses & Malware (9)
- VoIP Penetration Testing (4)
- Vulnerability Disclosure (16)
- Web Application Security (6)
- Windows Mobile Security (1)
- Zero Day Attack (5)