October 13, 2021

Double-check Inputs to Avoid SSRF Vulnerability

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
October 8, 2021
Deserialization Vulnerability

Testing Methodology for Insecure Deserialization Vulnerability

In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]
September 27, 2021
Serialization and Deserialization

Serialization and Deserialization: Languages they work with

When an object is translated to a byte sequence, and the byte sequence can be kept on a disk or sent through streams, the process is […]
September 13, 2021
cyber security metrics

Cyber Security Metrics for Board & Risk Committee

What are cyber security metrics?  Cyber security metrics are the number of systems with known vulnerabilities.  Knowing the number of vulnerable assets in your environment is […]
September 8, 2021

Easily Exploitable Critical Vulnerability in ProfilePress Plugin of WordPress CVE-2021-34621

Understanding the Vulnerability ProfilePress, formerly WP User Avatar, a WordPress plugin installed on over 400,000 sites made it possible for an attacker to upload arbitrary files […]
August 29, 2021

Cybersecurity webinar On-Demand Penetration Testing with BugDazz

Cyber-attacks are increasing as the digital world expands and managing pen-testing alongside can get complex and monotonous with the tracking remediation, collaboration, and following current status […]
July 29, 2021

What is Data Lake? Understanding Data Lake Building Security

Let’s start first with what is a data lake?  Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]
Enable Notifications    OK No thanks