Security Advisory

September 18, 2020
Ransomeware-attacks

The Surge in Ransomware Attacks

Ransomware, a malware that is capable of encrypting the files of the user. This eventually leads to a demand for ransom in exchange for restoring the […]
August 8, 2020
secure-remote-working

The Anatomy of Secure Remote Working- SecureLayer7

The pandemic of COVID-19 has changed the every day propensities for many individuals, and working schedules are no exception. With a large number of people abruptly […]
July 9, 2020

COVID-19’s Best Practices for Building Secure Mobile Applications

A worldwide catastrophe this contagious virus COVID-19 pandemic has raised endless problems to mankind. The restrictions we face today are something humans are not used to. […]
April 21, 2020
Phishing_Attacks_COVID_19

How to Secure Yourself From Coronavirus Phishing Attacks in Times of COVID-19

Introduction The year 2020 just had just started and we got struck with global pandemic COVID-19 caused by the novel coronavirus. With this global fear, one […]
January 9, 2020
Cybersecurity-trends-2020

Cybersecurity trends to look out for in 2020

The rise of cybersecurity threats in 2019 has made corporations across the globe, increasingly aware of the importance of security measures needed to combat these threats. […]
December 27, 2019
penetration-testing-provider

How to select Top Penetration Testing Companies in India?

Organizations are looking for a top penetration testing company in India and we have written a detailed blog about how to select top penetration testing companies […]
November 25, 2019
cyber risk questions

5 Security Questions You Must Answer While Briefing the Board on Cyber Risk

Are you all set to brief your board on the cyber risk of an organization? If yes, you must know how to respond to your board’s […]
June 4, 2018

Time to Disable TP-Link Home WiFi Router (CVE-2018-11714)

Hello Folks, We are BlackFog Team, some days before one of our team member found a very interesting bug in TP-Links Wifi Home Routers which gives full […]
October 17, 2017
WPA2 Protocol Vulnerability

WPA2 Protocol Vulnerability – Intercepting Password on Wireless Device

Overview The WPA2 Protocol vulnerability allows attacker to decrypt the network traffic from the vulnerable device and it also allow to view the critical information, injecting the packets/data […]
Enable Notifications    Ok No thanks