CloudDDoSProtection

Defensive and Preventive majors for Cloud DDoS Attack

What is a DDoS attack in cloud infrastructure? Distributed Denial of Service (DDoS) is an attack against the…

Read More

GDPR_FeatureImage

GDPR : The most important change in Data privacy regulation

What is GDPR? The General Data Protection Regulation (GDPR) is a new privacy protection regulation in the EU in…

Read More

penetration testing image

Dare to become a web application pen-tester

Dare to become a web application pentester? Here are a few essential “WHATS 101”! let's start with all the WHAT’S;…

Read More

XSS Feature image

Cross site scripting : Once again in OWASP Top 10

XSS is again in the OWASP Top 10 Vulnerabilities that are announced in 2017. XSS vulnerability is exploited in web…

Read More

SQLInjection

SQL Injection: Still on the Top List of OWASP Top 10

SQL Injection SQL injection flaws are syntax errors, occurs when an attacker can send hostile data to an interpreter.…

Read More

MiraiBoT

Mirai : Malware that infected IoT devices

Mirai  Mirai is a malware turns the networked devices running Linux into remotely controlled “bots” that can be used as…

Read More

Vulnerability / Threat

In today’s world, data and protecting that data are critical considerations for businesses. Customers want to ensure…

Read More

ZERO DAY

A zero-day exploit is an attack that exploits a previously unknown security vulnerability. A zero-dayattack is also…

Read More

Penetration testing : A step ahead of vulnerability assessment

What is Penetration testing? A penetration testing is a step ahead of vulnerability assessment, Penetration testing…

Read More

SOC image

Apache Metron: Advance Security Analytics

What is apache metron? Apache Metron is advanced security analytical framework offers a centralized tool for security…

Read More

BurpSuite Replicator

When it comes to Vulnerability assessment it is always an issue to make developer understand about the vulnerabilities…

Read More

Meltdown with a POC

Start of this year was much enthusiastic in terms of newly discovered vulnerabilities. Yes I am talking about Spectre…

Read More

Bug bounty Reward

Bug Bounty – A Vulnerability Reward Program

Introduction Bug Bounty is one of the Vulnerability Reward Program initiated by known companies and websites to…

Read More

OWASP Top 10 2017 | The Ten Most Critical Web Application Security Risks

OWASP Top 10 2017 The Ten Most Critical Web Application Security Risks SecuArk – Hyderabad, Telangana Change has…

Read More

Are you gambling with your security?

How long since you took a hard look at your cybersecurity? The Verizon Data Breach Investigations Report (DBIR) is…

Read More

How India Inc is losing its cybersecurity war

How India Inc is losing its cybersecurity war Mumbai’s top cybercop Brijesh Singh has his hands full these days. With…

Read More