Every organization has some data to protect. The data, if stolen can cause huge damage to an organization both reputational and financial. Hence, it becomes…
VAPT
VAPT techniques for Mobile Application Security
As more and more businesses adopt a mobile-first approach, mobile applications are becoming conventional in the industry. With them, they bring a lot of doubts…
VAPT Techniques for REST APIs
Every year, a hundred thousand APIs become available on the internet. API (application programming interface) is nothing but a language used among various applications. Studies…
Comparison of Hardware and Software Firewall
What is a hardware firewall? A hardware firewall is a physical device much like a server that filters the traffic going to a computer. While…
Vulnerability Assessment Of Windows 7 using Nexpose Tool
Penetration testing is performed on Win 7, Win Server 2008, Ubuntu form Kali being the attacker. All the Penetration test is performed on the Virtual…
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety experts on the user’s network for identifying possible vulnerabilities that…
Bank Application Cyber Security – Not A Child’s Play
While providing consultancy on cyber security, I am often asked a question by bank’s senior IT management — Why our application VAPT should be different…
Top 5 Reasons To Perform VAPT Of Your Web Application
I guess most of us know why a vulnerability assessment and penetration testing needs to be performed for web apps or mobile apps. Lately I…
Vulnerability Assessment – Automated v/s Manual Testing
We all know that there are 3 distinct pillars of software testing – functional testing, security testing and performance testing. There are multiple tools out…
Learnings From The Cyber Attacks on Banking Industry
Year 2018 was full of cyber-attacks and the most serious news was about well-orchestrated cyber-attacks on banking industry. No matter how much awareness is generated,…