Phishing has become a common word today, and although many people know what it means, they still fall prey to phishing attacks. Phishing is a type of social engineering, where hackers try to trick you […]
Category: cyber attack
cyber attack | Entersoft is a leading Application Security company in APAC. Follow Entersoft and get latest cybersecurity updates and insights.
How do you evaluate an external cybersecurity vendor?
With cybercrime on the rise, every organization, whether a large enterprise or a startup, should have expert cybersecurity professionals on the team, or onboard a trusted partners. Even if a company has an internal information […]
Axie Infinity – Ronin Network loses $620m in the largest-ever crypto heist
Axie Infinity is the biggest gaming platform that rewards users for playing games. Ronin Network, which is also owned by Vietnamese parent company Sky Mavis, allows players to exchange the digital coins they earn in […]
Application security for a secure enterprise
Remember when you clicked on a legitimate web application but were redirected to an entirely different site with malicious links? Then you have faced a very common web app vulnerability attack vector – a redirect […]
Approaching cyber security with a hacker’s mindset
Organisations today need security experts who use the unpredictability of ethical hackers to build constantly evolving, next-generation cyber security programs for greater business resilience. Relentless, highly intelligent, computer whiz, remarkable understanding of human psychology – […]
Cyber Threat Intelligence: A proactive approach to information security
Enterprises must look at advanced cyber threat intelligence (CTI) solutions as an investment rather than cost. CTI is a vital component of an advanced cybersecurity program to monitor and identify threats, and act quickly to […]
Log4j 2 vulnerability (CVE-2021-44228) – All that you need to know
What is Log4j? A new vulnerability has shaken cyberspace in the last few days creating great chaos. Known to be privately reported to Apache on November 24, it was made public on December 10. As […]
How Vulnerability Assessment and Penetration Testing (VAPT) can address gaps in your cybersecurity strategy
While developing an application, it’s very easy to leave security aspects for later. Functionality is key, your app is secure in the way it’s been designed, and you see no necessity to assess it for […]
Security Compliances – A must for organizations
What happens if organizations don’t meet compliance requirements? When building an application or website, organizations are responsible for the Security Compliances information being gathered, and how it will be used. This is fundamentally the story […]
Security Operations Centre (SOC) as a service – strengthening cyber security for SMEs
Have you noticed police officers at traffic signals, or security guards patrolling malls? They are part of a sophisticated security system designed to predict threats and prevent them. They usually receive instructions from a security […]