Skip to content

Cyber Security Blog

Open Menu
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 3

IoT Security

Step 3: Hosting the payload on a Website To host the payload, we use the inbuilt apache server. Replacing the default “index.html” file with the…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 2

IoT Security

Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to hack into any device on a different network is to…

Aishwarya
18/04/2020

Penetesting Industry 4.0 IoT Prototype – 1

IoT Security

Penetesting Industry 4.0 IoT Prototype Why we did this? Valency Networks is established into VAPT market but walking path of making IoT based industries secure….

Aishwarya
16/04/2020

Cyber Security Webinar – Working From Home – For Software Developers

Webinar

Cyber Security Tips – Working From Home For Software Developers Note – Enable sound – this video has an audio track.

Chetna
16/04/2020

Cyber Security Webinar – Working From Home – Securing Workstations

Webinar

Cyber Security Tips – Working From Home Securing Workstations Note – Enable sound – this video has an audio track.

Jemima
16/04/2020

Cyber Security Webinar – Working From Home – For Sysadmins

Webinar

Cyber Security Tips – Working From Home For Sysadmins Note – Enable sound – this video has an audio track.

Chetna
web-cloud-app-difference
15/04/2020

Difference Between Web Based application and Cloud Based Application

Cloud Security

This article talks about basic differences between web and cloud apps. It further explains what a pentester needs to think about, while performing vulnerability assessment…

Prashant
13/04/2020

Cyber Security Webinar – Working From Home – For HR And Admin

Webinar

Cyber Security Tips – Working From Home For HR And Admin Note – Enable sound – this video has an audio track.

Jemima
12/04/2020

Difference Between SOC2 Type I and Type II Reports

Compliance

What is the difference between SOC2 Type 1 report and Type 2 report? A SOC report helps organizations that provide a given type of service…

Prashant
08/04/2020

GDPR Compliance for Mobile Apps

Compliance, Mobile App Security

GDPR Compliance for Mobile Apps Many mobile apps handle PII (Personally Identifiable Information), which can be as simple as person’s name, phone number and address….

Prashant

Posts navigation

Older posts
Newer posts

Search by keywords

History

  • January 2025 (1)
  • December 2024 (1)
  • November 2024 (1)
  • October 2024 (1)
  • September 2024 (3)
  • August 2024 (1)
  • June 2024 (4)
  • May 2024 (1)
  • April 2024 (2)
  • March 2024 (2)
  • January 2024 (2)
  • December 2023 (2)
  • November 2023 (3)
  • September 2023 (4)
  • August 2023 (5)
  • July 2023 (11)
  • June 2023 (16)
  • May 2023 (2)
  • April 2023 (10)
  • February 2023 (4)
  • November 2022 (1)
  • July 2022 (5)
  • June 2022 (4)
  • January 2022 (1)
  • December 2021 (1)
  • April 2021 (3)
  • March 2021 (1)
  • January 2021 (10)
  • December 2020 (3)
  • August 2020 (1)
  • July 2020 (1)
  • April 2020 (13)
  • March 2020 (2)
  • February 2020 (17)
  • January 2020 (80)
July 2025
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
28293031  
« Jan    
© 2025 Cyber Security Blog
 / Theme: Really Simple / License: GPLv3