Security Hardening

Blockchain Security – Part 1

Blockchain is both a strength and a concern. Know basics of blockchain and blockchain security security practices to make it…

5 years ago

Introduction to Internet of Things (IoT)

Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set…

6 years ago

Security Advisory- MEGA Chrome Extension Hijack

What is MEGA? MEGA is a cloud storage and file hosting service offered by Mega Limited, a New Zealand-based company.…

6 years ago

Advisory | Microsoft Zero Day – Windows Task Scheduler Local Privilege Escalation Vulnerability

Introduction to Microsoft Zero Day Vulnerability A previously unknown zero day vulnerability has been disclosed in the Microsoft's Windows operating…

6 years ago

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

6 years ago

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

7 years ago

Buffer Overflow Attacks

Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It’s mostly bound in…

7 years ago

How To Develop Secure Software – Action Plan To Make Secure

The purpose of this article is to help to develop secure software. Easily avoided software defects are a primary cause…

8 years ago

Mobile Vulnerability Database (MVD)

Mobile Vulnerability Database, or MVD, is a unique place to find out about vulnerabilities reported worldwide for Mobile Platforms. Introduction…

8 years ago