DORA Compliance – A Complete Guide by Valency Networks 1. Introduction to DORA Compliance In today’s fast-evolving digital landscape, financial institutions and ICT service providers…
Is ICMP Timestamp Request Vulnerability worth considering
Is ICMP Timestamp Request Vulnerability worth considering? The ICMP timestamp request vulnerability highlighted in the Nessus scan (or similar other tools) is typically a low-severity…
Understanding Threat Intelligence in ISO 27001-2022
Understanding Threat Intelligence in ISO 27001:2022 When it comes to cybersecurity, being proactive is always better than being reactive. In fact, ISO 27001:2022 introduces a…
XML-RPC Vulnerability – Risk and Mitigations
XML-RPC Vulnerability – Risk and Mitigations Previous versions of WordPress (i.e., below version 3.5) were making use of XML RPC for the application to be…
Understanding SAST and DAST in Web Penetration Testing
Understanding SAST and DAST in Web Penetration Testing In the realm of web penetration testing, two primary methods stand out: Static Application Security Testing (SAST)…
Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing
Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing In network penetration testing, different testing methodologies—black box, gray box, and white…
Web Penetration – Blackbox, Graybox and Whitebox Explained
Understanding Web Penetration Testing: Black Box, Gray Box, and White Box Approaches Introduction: What This Article Is About and Why It’s Written? When we talk…
Understanding HIPAA Compliance – Why There’s No Official Certification
When dealing with HIPAA (Health Insurance Portability and Accountability Act) compliance, many organizations and healthcare providers often find themselves confused about certification. As a provider…
Difference between Blackbox Graybox and Red Teaming Cyber Security Services
Difference between Blackbox Graybox and Red Teaming Cyber Security Services Purpose of this article is to resolve the confusion between Black box testing, Gray box…
Why Fixing Vulnerable AngularJS and jQuery is Crucial for Web Security
In today’s digital landscape, web applications are the cornerstone of many businesses. Ensuring their security is paramount. However, many developers and organizations often overlook vulnerabilities…