Celebrating Cyber Security Awareness Month by Creating Awareness
Technology has made life easier not only for households but also for businesses. However, technology has also paved the way for cybercriminals to spread their roots and come up with new ways ...
Security and Safety of Decentralized Finance (DeFi) Platforms
Khushboo Chahal | | BFSI, blockchain, Cyber Security, Cybersecurity, decentralized finance, Finance Industry
In recent years, Decentralized Finance, commonly referred to as DeFi, has surged in popularity as a revolutionary financial ecosystem. DeFi platforms promise to democratize finance, offering decentralized alternatives to traditional banking, lending, ...
Execution of Arbitrary JavaScript in Android Application
Rahul Mandal | | Application Security, cross-site scripting, Cyber Security, deep links, WebView, Write-up
In this blog, we will learn about the possible ways to find cross-site scripting by abusing JavaScript in Android applications. Cross-site scripting (XSS) in an Android application occurs when an attacker successfully ...
Data Breaches in September 2023 – Infographic
A data breach occurs when unauthorized individuals or groups gain access to, steal, or expose sensitive, protected, or confidential information. These incidents can manifest through various means, including hacking, theft, or human ...
Data Breaches in August 2023
A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...
HTTP Parameter Pollution and Mass Assignment Attacks
This blog focuses on two important things: the HTTP parameter pollution attack and mass assignment vulnerability. It helps developers to understand the risks that web apps can face and how to make ...
Endpoint Security: The Least Privilege Approach
With endpoints being the primary targets for malicious attacks, adopting a robust security strategy is crucial. One such approach gaining prominence is “The Least Privilege Approach.” In this blog, we delve into ...
Data Breaches in July 2023 – Infographic
A data breach is when sensitive, protected, or confidential information is accessed, stolen, or exposed by an unauthorized individual or group. These incidents can occur in various ways, such as hacking, theft, ...
Understanding CRLF Injection: A Web Application Vulnerability and Mitigation
Sekhar Poola | | Application Security, CRLF Injection, Cyber Security, Cybersecurity, web application
CRLF (Carriage Return Line Feed) injection is a web application vulnerability that occurs when an attacker can inject malicious CRLF characters into an HTTP response. This vulnerability can lead to various security ...
Protect Your Systems from Malicious Packages: What You Need to Know
Malicious packages are a growing threat to businesses and organizations of all sizes. These packages are often disguised as legitimate software, but they can contain harmful code that can steal data, install ...