advisory

Deception Technology: The Art of Recording Cyber Attacks

Introduction To Deception technology:  Deception technology is a newest strategy to attract cyber criminals away from an enterprise's true assets…

3 years ago

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

5 years ago

Microsoft Zero Day – VCard Vulnerability

In this blog we are going to discuss about Microsoft Zero Day - VCard Vulnerability For Windows operating system. Introduction…

5 years ago

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

7 years ago

Threat Advisory Report on Petya Ransomware (Critical Severity)

Threat Advisory Report on Petya Ransomware Attack (Critical Severity) Ransomware: An Introduction Ransomware is a form of malicious software that…

7 years ago