What does a security breach really cost?

Posted by Mohan Gandhi on 5 mars 2019 20:26:35

FBI Director Robert Mueller once said, “There are only two types of companies: those that have been hacked, and those that will be.”  Every business, no matter its industry or scale, is a potential target and unless there is a strong security culture in place, odds are that a breach will occur, causing a loss of information, leakage of critical data or direct financial fraud. We have witnessed organizations across finance, healthcare, governance, retail, transportation, energy and education targeted by cyber-criminals in the last one year alone.

Read More

Topics: cybersecurity, Security Guidelines, cyber attack, Data breach

Remote Code Execution Vulnerability in Adobe Flash Player

Posted by Entersoft Team on 22 mars 2018 21:10:18

Adobe Flash Player is prone to an unspecified remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. Adobe Flash Player version 28.0.0.137 and prior versions are vulnerable.

Read More

Topics: cybersecurity, Hacks and news, cyber attack, vulnerability

Demystifying ARP Spoofing

Posted by Entersoft Team on 11 sept. 2017 22:14:18

 

 What is ARP Poisoning or ARP Spoofing attack?

ARP spoofing attack is an attack in which an attacker sends falsified ARP (Address Resolution Protocol) messages over LAN. As a result, the attacker can link his MAC address with the IP address of a legitimate computer (or server) on the network.

Read More

Topics: Application Security, cyber security, cyber attack

New Attack "XSSJacking" Combines Clickjacking, Pastejacking, and Self-XSS

Posted by Entersoft Team on 22 août 2017 22:39:05
Read More

Topics: Application Security, cyber security, cyber attack

New Vulnerability: IoT Devices Compromised by "Rakos"

Posted by Entersoft Team on 8 août 2017 22:41:03
Have you been in situations in which you find your IoT devices getting overloaded with networking and computing tasks? If the answer is yes, the chances are high that your devices are Rakos’s latest victims.
Read More

Topics: Application Security, cyber security, IOT Security, cyber attack

Petya Ransomeware: An Overview

Posted by Entersoft Team on 3 juil. 2017 22:14:32

What is Ransomware?

Read More

Topics: cybersecurity, Hacks and news, cyber attack

A Week at Fintech SuperCharger 2.0

Posted by Angad Gill on 18 janv. 2017 14:20:29

Supercharger, what a great way to begin our acceleration! Being part of Supercharger can fuel Entersoft to fulfil the mission to be the best in application security. Entersoft is well-positioned to meet this goal by being 1 out of the top 8 startups selected to be part of the Supercharger accelerator program. 

Read More

Topics: Android App Security, Android Security, cyber security, fintech, FinTech Security, Fintech Security standards, Fintech security Startup, Security in Fintech, cyber security startup's, Fintech startup's, cyber attack

Does a connected world make the underlying infrastructure a sitting duck for cyber criminals?

Posted by Angad Gill on 30 juil. 2016 16:01:30

ESBlog_ASCA.jpg

Smart cities offer infinite possibilities, promising smoother operations for organizations, ease- of-access for citizens, efficient energy consumption and seamless connectivity. But, are things as rosy as they seem?

Read More

Topics: Android App Security, cyber security, cyber security startup's, cyber attack