Nullcon is a well-known Indian cybersecurity conference and first time held in the Berlin, Germany location. The conference is known for its technical research talks and […]
Recently on www.ubercomp.com, a post was made regarding how the Redis sandbox was broken for Debian and Debian derived Linux distributions. Also, it was mentioned that […]
In the Spring Framework, a new Spring4Shell RCE vulnerability has been discovered and named CVE-2022-22965. Overview On March 30, 2022, various websites and technical blogs published […]
Hello there! Today we will discuss something scary but interesting: The “Ransomware attack”. Occasionally we hear from people about their data being tied up, and it’s […]
Why Is Gartner Talking About External Attack Surface Management (EASM) In a recent report from Gartner, External Attack Surface Management (EASM) has been introduced as an […]
Cyber-attacks are increasing as the digital world expands and managing pen-testing alongside can get complex and monotonous with the tracking remediation, collaboration, and following current status […]
Definition of ‘Cryptography’ “Cryptography is an information security tactic used to protect enterprise information and communication from cyber threats through the use of codes. This refers […]
Because of the expanding number of cybersecurity risks emerging in 2021, data leaks, and breaches, the security groups are squeezed to acquire permeability of big business […]
The past year has been challenging for enterprises along all verticals, especially when it comes to security assessment. Many had to adopt specialized security assessment services […]