
The Supply Chain Cybersecurity Saga: Challenges and SolutionsFeatured
According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The […]
According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The […]
The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has […]
The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]
One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use […]
This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess […]
INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer […]
Overview ASUS Router RT-N10 Plus is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the result_of_get_changed_status.asp […]
The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more […]
In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this […]