Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…
Penetesting Industry 4.0 IoT Prototype – 1
Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure….
Cyber Security Webinar – Working From Home – For Software Developers
Cyber Security Tips – Working From Home For Software Developers Note – Enable sound – this video has an audio track.
Cyber Security Webinar – Working From Home – Securing Workstations
Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.
Cyber Security Webinar – Working From Home – For Sysadmins
Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.
Difference Between Web Based application and Cloud Based Application
This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…
Cyber Security Webinar – Working From Home – For HR And Admin
Cyber Security Tips – Working From Home For HR And Admin Note – Enable sound – this video has an audio track.
Difference Between SOC2 Type I and Type II Reports
What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service…
GDPR Compliance for Mobile Apps
GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address….