The Supply Chain Cybersecurity Saga: Challenges and SolutionsFeatured
According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers […]
According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers […]
The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in […]
The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to either use the hardened laptop […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
One of the key security devices in a lot of organizations is an HSM – Hardware Security Module. All banks use it to store your debit […]
This article presents the key risks with DirectAccess and how to audit them. Let’s begin by first understanding the DirectAccess technology. Introduction of DirectAccess From […]
INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the […]
Overview ASUS Router RT-N10 Plus is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the result_of_get_changed_status.asp script. A remote authenticated attacker […]
The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more like shortcuts to standard text […]
In a previous article, we have described the Shellshock vulnerability and in this article we show how to exploit this vulnerability using the BeEF Framework. […]