February 24, 2021

Exploiting the XML External Entity Injection XXE Attack Vulnerability

Hey people, in this blog we will see what is XXE attack infusion and show some basic model assaults, and lastly sum up this post with […]
February 18, 2021
cybercrimes

Cybercrimes Prevention: International Cybersecurity Laws & implications

Is your business framework 100% prepared to confront the severest cybercrimes or cyber-attacks and alleviate the danger of potential data breaches? In the event that you […]
February 15, 2021
OWASP IOT

OWASP IoT Top 10 Series: Weak or Hardcoded Password Policy OWASP

In the last blog we had explored OWASP IoT Top 10 vulnerabilities overview, now we will explore the impact of each of these OWASP vulnerabilities on […]
February 10, 2021
Kubernetes Security

Kubernetes Security Webinar CISO: Kubernetes Pentest & Vulnerability

Get free Registration for Kubernetes security webinar on Tuesday, February 26th, 7:00 pm IST. Presented by Mr. Dhiyanesh Selvaraj. This webinar is designed for security professionals, […]
February 6, 2021
cybersecurity internship

CyberSecurity Internship to Employee… The Milestones of a Journey

The day 17th September 2020 is imprinted into my memory, as I started my first CyberSecurity Internship Program. The world is fighting against pandemics and the […]
February 3, 2021

Web Cache Poisoning – A Modern Methodology of Attacking Large User-Base

In this modern digital world, especially in the era of Work From Home (WFH), it is essential that the web applications we are being used on […]
January 25, 2021
need of cybersecurity

Need of Cybersecurity as viewed by the Educational Boards of India

India desperately needs more cyber-heroes to defend its web-fronts(and backs)! As one of the major economies of the world, India has and sincerely contributed to the […]
January 19, 2021
OWASP Top 10 Vulnerabilities

OWASP Top 10 Vulnerabilities IoT Security: Lack of Physical Hardening

With ever increases attack surfaces with IoT devices, physical hardening is also one of the important aspects of IoT Security. Many times these devices are being […]
January 14, 2021
secure-coding-practices

Secure Coding Practices 2021: Mobile Applications With Mobile Vulnerabilities

Improper platform usage is the major vulnerability of mobile applications. This vulnerability categorizes all the misuse or improper usage of any given functionality or a security […]
Enable Notifications    OK No thanks