Have Any Questions?
Call Now +91 8317 490 210
Blog > Tag

cybersecurity

Broken Access Control

Broken Access Control

Gaurish Bahurupi
September 9, 2024

Broken access control vulnerability occurs when an application fails to enforce proper authorization checks, allowing users to access resources or per...

Learning from Real-World Phishing Attacks

Learning from Real-World Phishing Attacks

Amit Bisht
August 13, 2024

Understanding the Growing Threat of Phishing Attacks in India and How Simulations Can Shield Your Organization from Catastrophic Losses

A pointer that  brought the world to a standstill

A pointer that brought the world to a standstill

Abhijit Mohanta
July 21, 2024

A minor bug in a kernel driver of one of the most popular Endpoint Detection and Response (EDR) solutions, CrowdStrike caused a Blue Screen also known...

Snowblind malware hidden threat android banking security

Snowblind malware hidden threat android banking security

Intelliroot
June 29, 2024

Snowblind, a new banking malware, is a sophisticated and insidious threat designed to exploit vulnerabilities in Android security features. This malwa...

Identity Theft

Identity Theft

Priyabrata Mohanty
June 10, 2024

Identity theft, a silent menace, involves stealing personal data for fraud. It causes financial loss and emotional distress, emphasizing the need for ...

Comprehensive guide to penetration testing

Comprehensive guide to penetration testing

Priyabrata Mohanty
May 28, 2024

In the ever-evolving cybersecurity landscape, penetration testing allows you to identify vulnerabilities before malicious actors can exploit them, for...

Understanding DDoS Attacks

Understanding DDoS Attacks

Team Intelliroot
May 13, 2024

In today's rapidly changing landscape of cybersecurity threats, Distributed Denial of Service (DDoS) attacks are considered as a formidable challenge ...

Process Hunting Toolkit

Process Hunting Toolkit

Abhijit Mohanta
May 8, 2024

Most of the time threat hunting is initiated by looking at the network logs or IDS IPS logs. But relying only on network logs may be enough as malware...