Internal threats refers to risks to data that stem from inside the organization due to poorly managed security of network, resources, assets and much more….
VAPT
How pentesting differs in various operating systems?
Different operating systems are based upon different ideologies. Linux based operating systems like Kali, Parrot OS, Backbox Linux are specifically made with certain inbuilt tools,…
What are the 4 types of IT security?
Every organization has some data to protect. The data, if stolen can cause huge damage to an organization both reputational and financial. Hence, it becomes…
VAPT techniques for Mobile Application Security
As more and more businesses adopt a mobile-first approach, mobile applications are becoming conventional in the industry. With them, they bring a lot of doubts…
VAPT Techniques for REST APIs
Every year, a hundred thousand APIs become available on the internet. API (application programming interface) is nothing but a language used among various applications. Studies…
Comparison of Hardware and Software Firewall
What is a hardware firewall? A hardware firewall is a physical device much like a server that filters the traffic going to a computer. While…
Vulnerability Assessment Of Windows 7 using Nexpose Tool
Penetration testing is performed on Win 7, Win Server 2008, Ubuntu form Kali being the attacker. All the Penetration test is performed on the Virtual…
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety experts on the user’s network for identifying possible vulnerabilities that…
Bank Application Cyber Security – Not A Child’s Play
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different…
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I…