Skip to content

Cyber Security Blog

Open Menu
31/01/2025

DORA Compliance – A Complete Guide by Valency Networks

Compliance

DORA Compliance – A Complete Guide by Valency Networks 1. Introduction to DORA Compliance In today’s fast-evolving digital landscape, financial institutions and ICT service providers…

Prashant
31/12/2024

Is ICMP Timestamp Request Vulnerability worth considering

VAPT

Is ICMP Timestamp Request Vulnerability worth considering? The ICMP timestamp request vulnerability highlighted in the Nessus scan (or similar other tools) is typically a low-severity…

Prashant
21/11/2024

Understanding Threat Intelligence in ISO 27001-2022

Compliance

Understanding Threat Intelligence in ISO 27001:2022 When it comes to cybersecurity, being proactive is always better than being reactive. In fact, ISO 27001:2022 introduces a…

Prashant
11/10/2024

XML-RPC Vulnerability – Risk and Mitigations

VAPT

XML-RPC Vulnerability – Risk and Mitigations Previous versions of WordPress (i.e., below version 3.5) were making use of XML RPC for the application to be…

Jemima
07/09/2024

Understanding SAST and DAST in Web Penetration Testing

Web VAPT

Understanding SAST and DAST in Web Penetration Testing In the realm of web penetration testing, two primary methods stand out: Static Application Security Testing (SAST)…

Prashant
07/09/2024

Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing

VAPT

Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing In network penetration testing, different testing methodologies—black box, gray box, and white…

Prashant
04/09/2024

Web Penetration – Blackbox, Graybox and Whitebox Explained

Web VAPT

Understanding Web Penetration Testing: Black Box, Gray Box, and White Box Approaches Introduction: What This Article Is About and Why It’s Written? When we talk…

Prashant
27/08/2024

Understanding HIPAA Compliance – Why There’s No Official Certification

Compliance

When dealing with HIPAA (Health Insurance Portability and Accountability Act) compliance, many organizations and healthcare providers often find themselves confused about certification. As a provider…

Prashant
ATTACHMENT DETAILS Difference-between-Blackbox-Graybox-and-Red-Teaming-Cyber-Security-Services
27/06/2024

Difference between Blackbox Graybox and Red Teaming Cyber Security Services

VAPT, Web VAPT

Difference between Blackbox Graybox and Red Teaming Cyber Security Services Purpose of this article is to resolve the confusion between Black box testing, Gray box…

Prashant
Why-Fixing-Vulnerable-AngularJS-And-JQuery-Is-Crucial-For-Web-Security
27/06/2024

Why Fixing Vulnerable AngularJS and jQuery is Crucial for Web Security

VAPT

In today’s digital landscape, web applications are the cornerstone of many businesses. Ensuring their security is paramount. However, many developers and organizations often overlook vulnerabilities…

Prashant

Posts navigation

Older posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3