17
Jan
What is a Cyber-attack Surface and How it can be Reduced!
0
The Digitization boom has picked up in the past 2 years and seen phenomenal growth over the past decade and so with it, we have... Read More
22
Jan
Top 5 Cybersecurity Threats to Dominate 2020
As we step into the new decade, we look forward to the rising trends in technologies and innovations that will make our lives much better.... Read More
25
Feb
Pharming – One of the deadly sins of online safety
In this digital age, as technological innovations continue to transform the world, cybercrime does its best to keep up. Just as one technique of cybercriminals... Read More
06
Feb
WHAT DO YOU KNOW ABOUT BROKEN AUTHENTICATION AND SESSION BREACH?
As we are covering OWASP top 10 vulnerabilities,broken authentication is one of it. Broken Authentication itself suggests the breach in the authentication procedure of a... Read More
19
Nov
A Complete Guide on Vulnerability Scanning – Types, Importance, Procedures, and Measures
With an increasing amount of threats day-by-day, we have invented scanners which could scan and assess the threats to alert the organization. Vulnerability means the... Read More
13
Jun
Jet Airways Phishing Attack
Phishing Scams are becoming more and more common these days with every other company falling victim to the scam and losing a lot of money... Read More
11
Jun
D-Mart Phishing Attack
With each passing day, businesses are seeing more and more malicious emails in their inboxes which are turning out to be dangerous for their website... Read More
31
May
Phishing – ESDS VTMScan
Introduction Phishing is a method used by attackers to trick you into disclosing personal information such as username, password, credit card and banking information. The... Read More