Recent Hacks You May Have Missed

Posted by Angad Gill on May 4, 2018 11:06:04 PM

When it comes to cybersecurity, 2018 has not been a great year so far with the whole Facebook fiasco and numerous compromised ICOs (more on that here). There are bigger hacks that generate noise and get a lot of attention and there a few smaller ones that go unnoticed. Here's a brief round up of some breaches from last month.

Read More

Remote Code Execution Vulnerability in Adobe Flash Player

Posted by Entersoft Team on Mar 22, 2018 9:10:18 PM

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player version and prior versions are vulnerable.

Read More

Topics: cybersecurity, Hacks and news, cyber attack, vulnerability

Latest ICO Hacks and Pitfalls

Posted by Angad Gill on Feb 7, 2018 8:11:21 AM

ICO attacks are new normal in 2018. On an average 10 ICOs get hacked every month. Successful ICOs are all about correct execution. 

Most founders do not factor in the required cyber security practices to launch tokens and end up losing millions to silly hacks. ICO startups are left with very few options after a heist.

Read More

Topics: Hacks and news, bitcoin, cryptocurrency, ethereum, blockchain

Entersoft Takes Top Spots At ET NET FinTech Awards

Posted by Angad Gill on Jan 29, 2018 11:22:20 PM

Entersoft emerged victorious as "Best Fintech Startup of 2017" and "Outstanding Application Security Solutions Provider" at the 2017 ET NET FinTech Awards for their proactive and offensive approach with DevSecOps, which assess applications for various security loopholes.

Read More

Topics: Awards, Events, fintech, Fintech security Startup, Hong Kong, supercharger, cyber security startup's, Fintech startup's

Implementing Security in IoT

Posted by Entersoft Team on Nov 29, 2017 9:44:36 PM


The Internet of Things continues to connect an ever-increasing number of devices. We're heading towards a seamlessly connected world that will have 24 billion IoT devices by 2020. Connected devices are making headway into each and every aspect of our lives, including homes, offices, cars and even cities.

Read More

Topics: Application Security, Application Security Guidelines, cyber security, IOT Security

What Happened at the IoT Hackfest

Posted by Angad Gill on Nov 27, 2017 9:52:26 PM


Entersoft Security in collaboration with IOT Forum India and TiE Bangalore conducted IOT Hackfest on 7th November 2017 at the TiE Bangalore office.

Read More

Topics: cyber security, Events, IOT Security, Security Guidelines

Entersoft to conduct IoT Hackfest in Bangalore

Posted by Mohan Gandhi on Nov 6, 2017 9:08:41 PM
Entersoft Security in collaboration with IOT Forum India and TIE Bangalore is conducting IOT Hackfest on 7th November 2017 at TiE Bangalore as a part of IOT Next


Read More

Topics: Events, Hacks and news, IOT Security

Vulnerability: XSS in Image Name

Posted by Entersoft Team on Oct 25, 2017 9:54:32 PM
We have frequently come across cross-site scripting vulnerability ( more about XSS ) in input fields where HTML special characters are not sanitized. However, these days most developers are aware of this vulnerability and diligently filter user-supplied inputs in forms and URLs.
Read More

Topics: Application Security, XSS, Cross site scripting, vulnerability

Interview with WandX

Posted by Angad Gill on Oct 24, 2017 2:48:07 AM

In our interview for this month, we venture into one of the most trending topics these days  and try to understand a decentralized application built on the Ethereum blockchain - WandX. A brief chat with the CEO, Abhinav Ramesh to discuss cryptocurrency based assets, FinTech in India, ICO hacks and P2P trading. 

Read More

Topics: FinTech Security, bitcoin, cryptocurrency, cryptoassets, P2P, ethereum, blockchain

Race Condition Vulnerabilities in Web Applications

Posted by Entersoft Team on Sep 15, 2017 8:14:29 PM

Race conditions in software arise when two concurrent threads of execution access a shared resource in a way that unintentionally produces different results; depending on the time at which the code is executed. For example, a multi-threaded program may spawn 2 threads that have access to the same location in memory.

Read More

Topics: Application Security, Application Security Guidelines, cyber security