Covid-19: How to keep your organisation safe

With the World Health Organization (WHO) announcing Coronavirus Disease 2019 (COVID-19) as a pandemic, organizations worldwide are being asked to shift to a remote workforce to curb its spread. Capitalizing on the situation are hackers […]

Web Application Firewall

Digital transformation is driving more and more enterprises to migrate a large number of their services to the cloud. In the face of increasing frequency of Distributed Denial of Service (DDoS) and automation attacks against […]

8 years of Cybersecurity at Entersoft

This year marks the 8th year of Entersoft Security! First off, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a concentrated […]

Securing AWS Cryptographic Keys

Securing sensitive data that resides on Amazon Web Services (AWS), enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a […]

OWASP TOP 10 API SECURITY RISKS

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest API security threats faced by organizations. According to the Gartner API strategy maturity model report, […]

Sensitive Files/Configuration Enumeration on Github

Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]

Hacked and Secured! – The Hong Kong FinTech HackFest

Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, […]

Remote Code Execution Vulnerability in Adobe Flash Player

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]