What is a Cyber-attack Surface and How it can be Reduced!
The Digitization boom has picked up in the past 2 years and seen phenomenal growth over the past decade and so with it, we have... Read More
Top 5 Cybersecurity Threats to Dominate 2020
As we step into the new decade, we look forward to the rising trends in technologies and innovations that will make our lives much better.... Read More
Pharming – One of the deadly sins of online safety
In this digital age, as technological innovations continue to transform the world, cybercrime does its best to keep up. Just as one technique of cybercriminals... Read More
WHAT DO YOU KNOW ABOUT BROKEN AUTHENTICATION AND SESSION BREACH?
As we are covering OWASP top 10 vulnerabilities,broken authentication is one of it. Broken Authentication itself suggests the breach in the authentication procedure of a... Read More
A Complete Guide on Vulnerability Scanning – Types, Importance, Procedures, and Measures
With an increasing amount of threats day-by-day, we have invented scanners which could scan and assess the threats to alert the organization. Vulnerability means the... Read More
Jet Airways Phishing Attack
Phishing Scams are becoming more and more common these days with every other company falling victim to the scam and losing a lot of money... Read More
D-Mart Phishing Attack
With each passing day, businesses are seeing more and more malicious emails in their inboxes which are turning out to be dangerous for their website... Read More
Phishing – ESDS VTMScan
Introduction Phishing is a method used by attackers to trick you into disclosing personal information such as username, password, credit card and banking information. The... Read More