8 years of Cybersecurity at Entersoft

This year marks the 8th year of cybersecurity at Entersoft Security! Firstly, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a […]

Securing AWS Cryptographic Keys

Securing AWS Cryptographic Keys from cyber attack , enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a personal GitHub […]

Vidar Malware

Vidar malware – a boon for cyber attacks, introduced in December 2018, is a family of malware and trojan horse virus that steals sensitive information and cryptocurrency from infected users. Presumed to have originated in […]

Secure Yourself From The Digital Grinch

It’s the holiday season! And while you are busy shopping, the Digital Grinch is lurking just around the corner. Global consumers are predicted to spend Ghost of Christmas Past 43% of holiday shopping identity theft […]

OWASP TOP 10 API SECURITY RISKS

API SECURITY

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]

Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]

Sensitive Files/Configuration Enumeration on Github

Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]

Addressing RBI compliance requirements for banks & NBFCs

RBI cybersecurity framework

Segasec and Entersoft to strengthen their partnership in India RBI cybersecurity framework Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve […]