Cybersecurity

January 17, 2023

GDPR Compliance Checklist

The General Data Protection Regulation (GDPR) is a cyber security framework introduced by the European Union (EU) on May 25th, 2018. It is the most stringent […]
January 10, 2023

The Impact of Cybersecurity Breaches on Public Trust in Healthcare

The healthcare industry is becoming increasingly reliant on technology, with electronic medical records, online appointment scheduling, and telemedicine becoming common practices. However, as technology becomes more […]
November 10, 2022

What is WAF (Web Application Firewall), And How Do You Bypass It?

In this blog, we will unravel all the concepts related to the security of WAF (Web Application Firewall). We will also know about how to bypass […]
October 21, 2022

What Is Attack Surface Management, And Why Is It Important?

Enterprise security systems continue to be targeted by the meticulous and sophisticated modern-day cyber-criminal. These attacks target and exploit areas of vulnerabilities such as cloud systems, […]
January 24, 2022

Critical Log4j Vulnerability and Recommendations to Resolve it

What is Log4J? Log4j is an open-source logging utility offered by Apache Software Foundation. This logging library is widely used by businesses in its application to […]
December 17, 2021

Websocket: common vulnerabilities plaguing it and managing them.

What is WebSocket? Efficient two-way communication protocol WebSocket is stateful where HTTP is stateless Two main parts: Handshake and data transfer WebSockets allows the client/server to […]
October 13, 2021

Double-check Inputs to Avoid SSRF Vulnerability

Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
October 8, 2021

Testing Methodology for Insecure Deserialization Vulnerability

In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]
September 27, 2021

Serialization and Deserialization: Languages they work with

When an object is translated to a byte sequence, and the byte sequence can be kept on a disk or sent through streams, the process is […]
Enable Notifications OK No thanks