Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]

Sensitive Files/Configuration Enumeration on Github

Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]

Misconfigured AWS S3 Bucket Enumeration

Amazon S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]

24 Hours, 5 Hackers – 7 Products Secured!

Entersoft hosted the Brisbane Hackfest earlier this month, as a practical, ethical hacking event to test digital assets of participating companies for vulnerabilities and fix them immediately with the help of our expert cybersecurity team. […]

What is your approach to security – Manual testing or a Web scanner?

A good answer is – Both. There is no silver bullet to cybersecurity. Conventional approaches rely entirely on a single type of testing – either manual or automated web scanners – leaving business leaders in a […]

Live Hack Demo at Bengaluru Tech Summit ft. Ankit Fadia

Entersoft Team demonstrated a live cyber attack on an Android phone in Bengaluru Tech Summit as a part of Entersoft’s flagship Hackfest event. The hack was followed by a Q&A session with Ankit Fadia. About the Hack Brief on Android OS: […]

Hacked and Secured! – The Hong Kong FinTech HackFest

Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, […]

Remote Code Execution Vulnerability in Adobe Flash Player

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]