Skip to content

Cyber Security Blog

Open Menu

Author: Prashant

31/01/2025

DORA Compliance – A Complete Guide by Valency Networks

Compliance

DORA Compliance – A Complete Guide by Valency Networks 1. Introduction to DORA Compliance In today’s fast-evolving digital landscape, financial institutions and ICT service providers…

Prashant
31/12/2024

Is ICMP Timestamp Request Vulnerability worth considering

VAPT

Is ICMP Timestamp Request Vulnerability worth considering? The ICMP timestamp request vulnerability highlighted in the Nessus scan (or similar other tools) is typically a low-severity…

Prashant
21/11/2024

Understanding Threat Intelligence in ISO 27001-2022

Compliance

Understanding Threat Intelligence in ISO 27001:2022 When it comes to cybersecurity, being proactive is always better than being reactive. In fact, ISO 27001:2022 introduces a…

Prashant
07/09/2024

Understanding SAST and DAST in Web Penetration Testing

Web VAPT

Understanding SAST and DAST in Web Penetration Testing In the realm of web penetration testing, two primary methods stand out: Static Application Security Testing (SAST)…

Prashant
07/09/2024

Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing

VAPT

Understanding Black Box, Gray Box, and White Box Testing in Network Penetration Testing In network penetration testing, different testing methodologies—black box, gray box, and white…

Prashant
04/09/2024

Web Penetration – Blackbox, Graybox and Whitebox Explained

Web VAPT

Understanding Web Penetration Testing: Black Box, Gray Box, and White Box Approaches Introduction: What This Article Is About and Why It’s Written? When we talk…

Prashant
27/08/2024

Understanding HIPAA Compliance – Why There’s No Official Certification

Compliance

When dealing with HIPAA (Health Insurance Portability and Accountability Act) compliance, many organizations and healthcare providers often find themselves confused about certification. As a provider…

Prashant
ATTACHMENT DETAILS Difference-between-Blackbox-Graybox-and-Red-Teaming-Cyber-Security-Services
27/06/2024

Difference between Blackbox Graybox and Red Teaming Cyber Security Services

VAPT, Web VAPT

Difference between Blackbox Graybox and Red Teaming Cyber Security Services Purpose of this article is to resolve the confusion between Black box testing, Gray box…

Prashant
Why-Fixing-Vulnerable-AngularJS-And-JQuery-Is-Crucial-For-Web-Security
27/06/2024

Why Fixing Vulnerable AngularJS and jQuery is Crucial for Web Security

VAPT

In today’s digital landscape, web applications are the cornerstone of many businesses. Ensuring their security is paramount. However, many developers and organizations often overlook vulnerabilities…

Prashant
xss fixation vapt companies
06/06/2024

Tackling XSS – The Right Way to Fix Vulnerabilities

VAPT

As the CTO of Valency Networks, I’ve seen many software developers struggle with cross-site scripting (XSS) vulnerabilities. Unfortunately, a common mistake is to focus on…

Prashant

Posts navigation

Older posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
May 2025
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3