Image

Buffer Overflow

By Sameera GP

A buffer overflow takes place when more data is put into a fixed-length buffer than the buffer can handle. The extra information, which has to go somewhere, can overflow into adjacent memory space, corrupting or overwriting the data held in that space.

READ MORE
Image

API Security

By Ashish Chhatani

API is nothing but an intermediator between you and the application system which conveys the system about your needs and gets what you want from an application in return.

READ MORE
Image

Importance of 2 Factor Authentication

By Mohammed Oosman

Two-factor authentication (also known as 2FA) is a type, or subset, of multi-factor authentication. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are.

READ MORE
Image

Talking with the expert- Fathima Riyazhyder

By Ashish Chhatani

Talking with the team lead of Sony pictures entertainment- Fathima Riyazhyder where she shares the insights of InfoSec domain and her career experiences.

READ MORE
Image

Understanding Insecure Deserialization

By Pankaj Rane

Process of converting an object into a stream of bytes is called Serialization and the process of creating object from that stream of bytes is called Deserialization.

READ MORE
Image

Diving deep into cookie security

By Ashish Chhatani

A cookie is a small piece of data that a server sends to the user's web browser. The browser may store it and send it back with the next request to the same server. Cookies let us get around the statelessness of the HTTP protocol by storing data at the client-side. Usually the cookies are set using Set-cookie in the HTTP header.

READ MORE
Image

Tech catching an eye- IAST

By Pankaj Rane

IAST is Interactive Application Security Testing. It’s also been known variously as hybrid security testing, gray-box, and glass-box. It is somewhat a little bit newer into the environment.

READ MORE
Image

State of ML and AI in InfoSec

By Ashish Chhatani

The whole idea behind machine learning was to make machine learn the behaviour and understand the tasks rather than feeding them with what they should know.

READ MORE
Image

The WAF story!

By Mohammed Oosman

A firewall in simple terms is a network security implementation used to monitor the ingoing and the outgoing traffic based on the rules defined for a network.

READ MORE
Image

GDPR- Your data, Your say!

By Pankaj Rane

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states.

READ MORE
Image

Talking with the expert- Pathik Patel

By Ashish Chhatani

Talking with the Principal Cloud Security Architect of Informatica- Pathik Patel where he shares the insights of InfoSec domain, career experiences and advise for the young guns.

READ MORE
Image

Importance of Secure SDLC

By Ashish Chhatani

Secure SDLC is nothing but implementing the well needed security in the application covering all the areas of it.

READ MORE
Image

Rise of Ransomware

By Ashish Chhatani

Ransomware is a malware or you can say malicious software which infects computers and restricts their access to files, often threatening permanent data destruction unless a ransom is paid.

READ MORE
Image

ZipSlip

By Ashish Chhatani

Zip Slip is a widespread critical archive extraction vulnerability, allowing attackers to write arbitrary files on the system, typically resulting in remote command execution.

READ MORE
Image

Air-gapped computer: A superhero in disguise

By Mohammed Oosman

Superheroes do exist in the world of compters, which are known as "Air Gapped Computers."

READ MORE
Image

Deep Exploit

By Ashish Chhatani

A Penetration testing tool built using Machine Learning concept.The notable feature is the tool has the self-learning capability with very less time as it has adopted the advanced machine learning model called A3C.

READ MORE
Image

PasteJacking

By Pankaj Rane

Pastejacking is a method that malicious websites employ to take control of your computers’ clipboard and change its content to something harmful without your knowledge.

READ MORE
Image

SubOver

By Ashish Chhatani

A Powerful pentest subdomain takeover tool

READ MORE
Image

The DDoS story- From Rise to Destruction

By Nilesh Lulle

DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

READ MORE
Image

QRLJacking- New way of Social Engineering Attack

By Pankaj Rane

Social engineering strikes again and this time its via QR code.QRLjacking or Quick Response Code Login jacking is a simple social engineering attack vector capable of session hijacking affecting all the applications that rely on "Login with QR code" feature as a secure way to login into accounts.

READ MORE
Image

S3Scanner

By Ashish Chhatani

A quick and dirty script to find unsecured S3 buckets and dump their contents

READ MORE
Image
Image

Bio Hacking

By Ankit Kapoor

Biohacking is managing own biology with medical, nutritional and electronic techniques which can include use of smart drugs(nootropics), non-toxic substances and different cybernetic devices. This can be any form like experimenting with DNA or injecting new stuff in body (like microchip, camera, NFC, etc.). People who experiment on their own body called themselves biohacker and are also known as Grinder.

READ MORE
Image

Blockchain- Hottest gosip of the Town

By Pankaj Rane

The invention of the blockchain for bitcoin made it the first digital currency to solve the double spending problem without the need of a trusted authority or central server. The bitcoin design has been the inspiration for other applications.

READ MORE
Image

ReelPhish

By Ashish Chhatani

FireEye has developed a new tool called ReelPhish which eases out the phishing methods. It has been built to eliminate the risk of social engineering.

READ MORE
Image

Wifi Security Protocols

By Ashish Chhatani

In today’s world Wi-Fi has become the essential thing in our daily routine. The wireless networks are also not secure in this digital age.

READ MORE