New Attack “XSSJacking” Combines Clickjacking, Pastejacking, and Self-XSS

XSSJacking is a new web-based attack that combines three other techniques  — Clickjacking, Pastejacking, and Self-XSS — to steal data from users. XSSJacking can help attackers reach sensitive information for which they would normally need a […]

New Vulnerability: IoT Devices Compromised by “Rakos”

Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims. What […]

Demystifying ARP Spoofing

What is ARP Poisoning or ARP Spoofing attack? ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his […]

Entersoft Security Pack: FinTech

Banks now work hand in hand with companies in Fintech. Banks regularly partner with Fintech startups to implement innovative technologies such as Robo advice, Chatbots, KYC and Regtech, Blockchain, Wealth Management, Artificial Intelligence, Big Data […]

IoT Attack Surface Mapping

Simply put, IoT is the interface between the physical and digital world that allows one to gather information from – and control – everyday objects. When you have a random IoT object/device – a thermostat, a […]

New Vulnerability: Raspberry Pi Malware Mines Cryptocurrency

What is Raspberry Pi? Raspberry Pi is an open source, computer hardware and software company, project, and user community that designs and manufactures single-board microcontrollers and microcontroller kits for building digital devices and interactive objects […]

Entersoft Vulnerability Overview: Insufficient Attack Protection

What follows in the article is a brief overview of a OWASP Top 10 2017 vulnerability – A7-Insufficient Attack Protection. This post is useful for beginners who want to understand about Insufficient Attack Protection and for […]

Top Hacks of 2016

As it turns out, 2016 was even worse than the popular public opinion, with cyber-attacks on major companies practically every day. It was a yearlong Christmas for cyber criminals. Some were politically motivated, most did […]

Entersoft Essentials: Android Security Guidelines to Secure Your App

Lack of Android Security Guidelines standards at any market place makes it difficult to manage security controls at an application level. Having a strong security checklist in place not only improves app security but the […]

Introducing Jared!

We are very pleased to announce Jared’s arrival to our team as a social engineering expert. Jared has been responsible for working with some of the world’s largest security systems and product providers. He has […]