Vidar malware – a boon for cyber attacks, introduced in December 2018, is a family of malware and trojan horse virus that steals sensitive information and cryptocurrency from infected users. Presumed to have originated in […]
Author: Entersoft Team
Secure Yourself From The Digital Grinch
It’s the holiday season! And while you are busy shopping, the Digital Grinch is lurking just around the corner. Global consumers are predicted to spend Ghost of Christmas Past 43% of holiday shopping identity theft […]
OWASP TOP 10 API SECURITY RISKS
Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]
Radio Frequency Hack using SDR Dongle
Radio Frequency signal plays a vital role in IoT(Internet of Things), in devices like vehicle monitoring, remote control, wireless data transmissions, garage Openers, etc. Want to understand the basics of RF or other types of […]
Open-source Intelligence
Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]
Sensitive Files/Configuration Enumeration on Github
Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]
Misconfigured AWS S3 storage Bucket Enumeration
AWS S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]
24 Hours, 5 Hackers – 7 Products Secured!
Entersoft hosted the Brisbane Hackfest earlier this month, as a practical, ethical hacking event to test digital assets of participating companies for vulnerabilities and fix them immediately with the help of our expert cybersecurity team. […]
What is your approach to security – Manual testing or a Web scanner?
A good answer is – Both. There is no silver bullet to cybersecurity. Conventional approaches rely entirely on a single type of testing – either manual testing or automated web scanners – leaving business leaders in […]
For blockchain businesses, every day could be April Fool’s Day!
Cybercriminals worldwide target blockchain businesses with a variety of attacks including phishing, making a fool of them every single day. Scammers and phishers are a great threat to blockchain businesses. Here’s what you need to […]