Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]
Category: vulnerability
vulnerability | Entersoft is a leading Application Security company in APAC. Follow Entersoft and get latest cybersecurity updates and insights.
Sensitive Files/Configuration Enumeration on Github
Version Control System: Version Control System (VCS) is a software that helps software developers to work together and maintain a complete history of their work. Listed below are the functions of a VCS:1. Allows developers […]
Addressing RBI compliance requirements for banks & NBFCs
Segasec and Entersoft to strengthen their partnership in India RBI cybersecurity framework Tel Aviv, February 13, 2019 – India is among the top four nations targeted by phishing attacks according to a recent research. Consequently, the Reserve […]
Tel Aviv Hackfest
Entersoft successfully conducted Tel Aviv Hackfest in collaboration with SQ Link Group, Israel’s leading IT Company on 24 July 2018 at SQ Link office, Ramat Gan, Tel Aviv. Entersoft has partnered with SQ Link Group recently to promote Application […]
Hacked and Secured! – The Hong Kong FinTech HackFest
Cyber security in FinTech is a growing concern, with no markets more directly impacted by its rise than banks, payments and Blockchain. Data from banks and other financial organisations is a premium target for hackers, […]
Remote Code Execution Vulnerability in Adobe Flash Player
Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause […]
Vulnerability: XSS in Image Name
We have frequently come across cross-site scripting vulnerability (more about XSS) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied […]