Skip to content

Cyber Security Blog

Open Menu

Month: April 2020

21/04/2020

Cyber Security Webinar – Working From Home – For Senior Management

Webinar

Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – this video has an audio track.

Jemima
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 5

IoT Security

Here is the collection of videos of previous 4 articles. These videos show in steps how the setup was attacked and vulnerabilities were exploited. Video…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 4

IoT Security

Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses cryptographic code signing techniques, assures that a device only executes…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 3

IoT Security

Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 2

IoT Security

Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 1

IoT Security

Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure….

Aishwarya
16/04/2020

Cyber Security Webinar – Working From Home – For Software Developers

Webinar

Cyber Security Tips – Working From Home For Software Developers Note – Enable sound – this video has an audio track.

Chetna
16/04/2020

Cyber Security Webinar – Working From Home – Securing Workstations

Webinar

Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.

Jemima
16/04/2020

Cyber Security Webinar – Working From Home – For Sysadmins

Webinar

Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.

Chetna
web-cloud-app-difference
15/04/2020

Difference Between Web Based application and Cloud Based Application

Cloud Security

This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…

Prashant

Posts navigation

Older posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
April 2020
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
27282930  
« Mar   Jul »
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3