Secure Yourself From The Digital Grinch

It’s the holiday season! And while you are busy shopping, the Digital Grinch is lurking just around the corner. Global consumers are predicted to spend Ghost of Christmas Past 43% of holiday shopping identity theft […]

OWASP TOP 10 API SECURITY RISKS

API SECURITY

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]

Radio Frequency Hack using SDR Dongle

Radio Frequency signal

Radio Frequency signal plays a vital role in IoT(Internet of Things), in devices like vehicle monitoring, remote control, wireless data transmissions, garage Openers, etc. Want to understand the basics of RF or other types of […]

Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]

Sensitive Files/Configuration Enumeration on Github

Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]

What does a security breach really cost?

What does a security breach

FBI Director Robert Mueller once said, “There are only two types of companies: those that have been hacked, and those that will be.”  Every business, no matter its industry or scale, is a potential target and […]

Addressing RBI compliance requirements for banks & NBFCs

RBI cybersecurity framework

Segasec and Entersoft to strengthen their partnership in India RBI cybersecurity framework Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve […]

Remote Code Execution Vulnerability in Adobe Flash Player

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]

New Attack “XSSJacking” Combines Clickjacking, Pastejacking, and Self-XSS

XSSJacking is a new web-based attack that combines three other techniques  — Clickjacking, Pastejacking, and Self-XSS — to steal data from users. XSSJacking can help attackers reach sensitive information for which they would normally need a […]

New Vulnerability: IoT Devices Compromised by “Rakos”

Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims. What […]