About Us Contact Us
Home About Services Solutions Industries Knowledge Blog Contact
Hit enter to search

Blogs

Application Security

Application Security

Human example

Application Security has come over a long way from its origins to where it is now. The evolution of Application security and its history can be dated back to at least 1980s. More arrow_forward

Application Testing

Various Types of Testing & their Uses

 

Application testing is a very broad field has many kinds of different types & procedures and kinds that can be used for the testing of a particular type of application. More arrow_forward

AWS Security

AWS Security Best Practices to reduce Risks

 

AWS Security Best Practices to reduce Risks... More arrow_forward

CyberSecurity BFSI

Best Cybersecurity practises in BFSI

 

BFSI has emerged as the most important industry vertical to be using big data and Important financial information as core banking market now encompasses... More arrow_forward

Security Challenges in Blockchain

Security Challenges in Blockchain

 

Blockchain has taken the cashless transaction mechanics by a storm and has a big potential to revolutionize the IT and financial sector in a powerful way. More arrow_forward

Evolution of Application Security

Evolution of Application Security

 

Application Security has come over a long way from its origins to where it is now. The evolution of Application security and its history can be dated back to at least 1980s. More arrow_forward

Cybersecurity Challenges in Healthcare

Cybersecurity Challenges in Healthcare

 

In recent years, the one industry that is quite on the bloom leveraging the technological advances coming through its industry is the healthcare sector. More arrow_forward

Identity Management

Identity Management

 

Identity management defines the authenticity, accessibility and identifying individual user or group of users by associating rights and restrictions with the specific identity. More arrow_forward

3 Common Cybersecurity Loopholes

3 common Cyber Security Loopholes

 

Most of the IT companies nowadays opt and work in an AGILE Environment, where the development process changes according to dynamic changes felt in the needs and... More arrow_forward

Predicitive Analysis

What is Predictive Analysis

 

Predictive analysis is done by gathering and reviewing the available historical information, machine learning, & computing to predict what is the likelihood... More arrow_forward

Red Team

What is RED TEAM

 

For many organizations finding vulnerabilities in their security architecture can be a little difficult by itself and relying on internal audits... More arrow_forward

Cyberthreats in Travel Industry

Cyberthreats in Travel Industry

 

Travel & Tourism is one of those industries which has positioned itself on the digital domain on account of the widespread digitalization going around the world. More arrow_forward

What Constitutes a Secure Cloud System

What constitutes a Secure Cloud System

 

Cloud security is the top priority for IT professionals in 2019, according to a survey from NetEnrich. More arrow_forward

Whatsapp account hacked with Video Call infopercept

Did you know your Whatsapp account can be hacked with a single video call

 

Coming just months after the world found out that hackers can gain access to a user’s phone through a simple phone call. More arrow_forward

Heist infopercept

Heist an Introduction

 

Today we will go through the walkthrough of the machine Heist which retired very recently. More arrow_forward

aws s3 infopercept

Importance of proper configuration of AWS S3

 

About the methodology or the procedure to test for misconfigurations in the target client’s AWS S3 buckets More arrow_forward

What Constitutes a Secure Cloud System

Introduction to Networked Box

 

We will go through the walkthrough of machine Networked which retired very recently. More arrow_forward

Cyberthreats in Travel Industry

A guide to Jarvis automation

 

Jarvis will be offered to automakers as a pay-as-you-go, cloud-based service. Once an automaker signs up, Jarvis can scan any piece of software that may go into a new car to detect possible vulnerabilities. More arrow_forward

What Constitutes a Secure Cloud System

Working with Haystack

 

Stack is an acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Together, they form a log management platform. More arrow_forward

What Constitutes a Secure Cloud System

Learn to work with Writeup Box

 

It was a bit tricky box given that it was categorized into the easy level. Getting the user flag was pretty straightforward but... More arrow_forward

Cyberthreats in Travel Industry

Understanding Swagshop

 

It was actually a fairly easy box and was based on the Linux machine. Getting the root flag was much easier compared to the user flag. More arrow_forward

What Constitutes a Secure Cloud System

Working with Machine Netmon

 

It was actually a fairly easy box and was based on windows machine. Getting the user flag was damn easy and the root flag wasn’t that difficult as well More arrow_forward

What Constitutes a Secure Cloud System

How Machine Curling works

 

It was actually a fun box and the level of the box was stated as easy. Getting the user flag was tougher than getting the root flag More arrow_forward

Cyberthreats in Travel Industry

Bypassing the LibSSH Authentication

 

LibSSH is a C library that enables you to write a program that uses the SSH protocol. With it, you can remotely execute programs More arrow_forward

What Constitutes a Secure Cloud System

Apache Struts2 Code Execution Exploit

 

Apache Struts is a very popular open source web application framework that is used to develop Java-based web applications More arrow_forward

What Constitutes a Secure Cloud System

Breaching the windows server

 

EternalBlue is nothing but an exploit that was actually developed and used by the National Security Agency (NSA) More arrow_forward

Cyberthreats in Travel Industry

Finding Vulnerability in Dell Webpagex

 

According to the internet, Cross-Site Scripting (XSS) attacks are a type of injection More arrow_forward

What Constitutes a Secure Cloud System

Things you must know before diving into information security

 

Ever thought of starting your career in the security field?? More arrow_forward

What Constitutes a Secure Cloud System

Malware behind the largest DDOS attack (Mirai Botnet)

 

Mirai Botnet came into light in October 2016 when it was responsible for a DDOS attack that took down many large website More arrow_forward

Cyberthreats in Travel Industry

XSS Vulnerabilities on Monstra CMS 3.0.4

 

This article is about the XSS vulnerabilities that I had found out on Monstra CMS 3.0.4. More arrow_forward

What Constitutes a Secure Cloud System

Understanding the attack

 

In this article we will be understanding the arp spoof attack which is basically a type of man in the middle attack.. More arrow_forward

What Constitutes a Secure Cloud System

Executing the Attack

 

In this article we will see how to carry out an arp spoof attack which will lead to sniffing packets along with stealing More arrow_forward

Cyberthreats in Travel Industry

A Guide to Security lingo

 

In our modern world where mostly everything is networked in some way or the other, security has become a major worldwide More arrow_forward

What Constitutes a Secure Cloud System

Cyber Attacks in Travel Industry

 

Do you know travel and transportation industry is the 2nd most targeted industry for cyber-attacks in the year 2018 More arrow_forward

AI IoT infopercept

Cybersecurity 2020 AI IoT Indsider

 

Cybersecurity now requires a more holistic approach with you having to ascertain and manage the Software, Hardware & Human element. More arrow_forward