In this blog, let’s dive deep into PHP Deserialization Vulnerability on how to identify the serialization and exploit the vulnerability in PHP applications. The deserialization vulnerability […]
What are cyber security metrics? Cyber security metrics are the number of systems with known vulnerabilities. Knowing the number of vulnerable assets in your environment is […]
Understanding the Vulnerability ProfilePress, formerly WP User Avatar, a WordPress plugin installed on over 400,000 sites made it possible for an attacker to upload arbitrary files […]
Cyber-attacks are increasing as the digital world expands and managing pen-testing alongside can get complex and monotonous with the tracking remediation, collaboration, and following current status […]
What is two-factor authentication? Two-factor authentication (2FA) is an essential security measure that enhances access security by demanding two distinct methods to verify one’s identity. It […]
Let’s start first with what is a data lake? Below is the oversimplified definition – Data Lake acts as a single centralized repository where raw data […]
This article will take you through each step that essentially contributes to the whole process of AWS vulnerability scanning. Before delving deep into all the methods […]