Security Advisory

July 9, 2020

COVID-19’s Best Practices for Building Secure Mobile Applications

A worldwide catastrophe this contagious virus COVID-19 pandemic has raised endless problems to mankind. The restrictions we face today are something humans are not used to. […]
April 21, 2020
Phishing_Attacks_COVID_19

How to Secure Yourself From Coronavirus Phishing Attacks in Times of COVID-19

Introduction The year 2020 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one […]
January 9, 2020
Cybersecurity-trends-2020

Cybersecurity trends to look out for in 2020

The rise of cybersecurity threats in 2019 has made corporations across the globe, increasingly aware of the importance of security measures needed to combat these threats. […]
December 27, 2019
penetration-testing-provider

How to select Top Penetration Testing Companies in India?

Organizations are looking for a top penetration testing company in India and we have written a detailed blog about how to select top penetration testing companies […]
November 25, 2019
cyber risk questions

5 Security Questions You Must Answer While Briefing the Board on Cyber Risk

Are you all set to brief your board on the cyber risk of an organization? If yes, you must know how to respond to your board’s […]
June 4, 2018

Time to Disable TP-Link Home WiFi Router (CVE-2018-11714)

Hello Folks, We are BlackFog Team, some days before one of our team member found a very interesting bug in TP-Links Wifi Home Routers which gives full […]
October 17, 2017
WPA2 Protocol Vulnerability

WPA2 Protocol Vulnerability – Intercepting Password on Wireless Device

Overview The WPA2 Protocol vulnerability allows attacker to decrypt the network traffic from the vulnerable device and it also allow to view the critical information, injecting the packets/data […]
Enable Notifications.    Ok No thanks