Australia’s recent run of serious data breaches has left many commentators asking some very pressing questions. It seems as though there’s perhaps a lot more to it than meets the eye. Yes, one could describe […]
Category: AWS
A guide to CIS Benchmarks
CIS benchmarks are specifically followed to secure applications at the configuration level. These activities include server hardening, cloud configuration reviews, browser or database hardening, etc. While OWASP provides insight on application security and common vulnerabilities […]
Automation to manage end-to-end data security
Employing automation solutions to implement data security depends on the particular business context. If your enterprise functions in a highly sensitive or regulated industry, then automation solutions can be a great way to minimize downtime […]
8 years of Cybersecurity at Entersoft
This year marks the 8th year of cybersecurity at Entersoft Security! Firstly, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a […]
Open-source Intelligence
Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]
Sensitive Files/Configuration Enumeration on Github
Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]
Misconfigured AWS S3 storage Bucket Enumeration
AWS S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]