Vidar Malware

Introduced in December 2018, Vidar is a family of malware and trojan horse virus that steals sensitive information and cryptocurrency from infected users. Presumed to have originated in Russia, Vidar is a family of malware […]

OWASP TOP 10 API SECURITY RISKS

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest API security threats faced by organizations. According to the Gartner API strategy maturity model report, […]

RF Hack using SDR Dongle

Radio Frequency plays a vital role in IoT(Internet of Things), in devices like vehicle monitoring, remote control, wireless data transmissions, garage Openers, etc. Want to understand the basics of RF or other types of frequencies. […]

Misconfigured AWS S3 Bucket Enumeration

Amazon S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]

Addressing RBI compliance requirements for banks & NBFCs

Segasec and Entersoft to strengthen their partnership in India Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve Bank of India […]

Entersoft Takes Top Spots At ET NET FinTech Awards

Entersoft emerged victorious as “Best Fintech Startup of 2017” and “Outstanding Application Security Solutions Provider” at the 2017 ET NET FinTech Awards for their proactive and offensive approach with DevSecOps, which assess applications for various security loopholes. Mohan Gandhi, […]

Hacked and Secured! – The Hong Kong FinTech HackFest

Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, […]

Remote Code Execution Vulnerability in Adobe Flash Player

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]