Attackers use SSRF, a web application vulnerability, to bring about a request from the server-side application to a random domain; usually, attackers choose the domain. Server-Side […]
In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]
What are cyber security metrics? Cyber security metrics are the number of systems with known vulnerabilities. Knowing the number of vulnerable assets in your environment is […]
Let’s start first with what is a data lake? Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]
Register free for the upcoming cyber security webinar 2021 where our security expert Mr Swar Shah will share helpful methods establishing a better sense of security and […]
Definition of ‘Cryptography’ “Cryptography is an information security tactic used to protect enterprise information and communication from cyber threats through the use of codes. This refers […]
Get free Registration for the cyber security webinar on Strategies of tomorrow’s cyber security on Wednesday, June 30th, 2021, at 7:00 pm IST presented by Ms. Jeenika Anadani […]