Knowledge-base

September 18, 2020
Ransomeware-attacks

The Surge in Ransomware Attacks

Ransomware, a malware that is capable of encrypting the files of the user. This eventually leads to a demand for ransom in exchange for restoring the […]
August 8, 2020
secure-remote-working

The Anatomy of Secure Remote Working- SecureLayer7

The pandemic of COVID-19 has changed the every day propensities for many individuals, and working schedules are no exception. With a large number of people abruptly […]
July 18, 2020
OWASP IoT Top 10 Overview

OWASP Top 10 Overview and Vulnerabilities

What is OWASP? OWASP, also known as the Open Web Application Security Project, is an online platform that creates articles available freely, programs, documentation, tools, and […]
July 9, 2020

COVID-19’s Best Practices for Building Secure Mobile Applications

A worldwide catastrophe this contagious virus COVID-19 pandemic has raised endless problems to mankind. The restrictions we face today are something humans are not used to. […]
June 12, 2020
HTTP Request Smuggling

Everything about HTTP Request Smuggling

What is HTTP Request Smuggling? Hiding HTTP Request in HTTP Request. That is the main idea. Simple, right? Well, we can say that HTTP Request Smuggling […]
April 21, 2020
Phishing_Attacks_COVID_19

How to Secure Yourself From Coronavirus Phishing Attacks in Times of COVID-19

Introduction The year 2020 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one […]
June 27, 2019
UART Pins

Identifying UART Pins Without a Multi-Meter

As someone who likes to tinker with hardware, we often find ourselves opening up a device to find UART pins which are originally meant for debugging […]
June 27, 2019
ARM Architecture

Arm Exploitation Series #1 — Introduction to the ARM Architecture

With the increasing growth in Internet-Of-Things (IoT) devices, it is an absolute necessity to scrutinize the security of these devices too, especially when they’re going to […]
December 16, 2018
Reading time: 8/10 minutes   Folks!! In this blog, I will talk about Command and Control Servers (C&Cs) and diverse procedures utilized by “assailants” “attacker” to fabricate a powerful and […]
Enable Notifications    Ok No thanks