Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some of the most reputed organizations, including Apple, Microsoft, Google, Cisco, and IBM. In this post, we will do a deep dive around what is Fuzzing, its advantages, disadvantages, and the tools used for Fuzzing. Industry bodies & regulatory agencies requiring or recommending fuzz testing include …
Read More »Vulnerabilities
What is ARP Spoofing/Poisoning & tips for security
ARP Spoofing consists of a hacking technique created to impersonate entities or people on the network to obtain private information or gain access to websites and applications with a stolen session-id or credentials or launch a DoS attack. To understand what ARP spoofing is and how it works, we need to understand more about Address Resolution Protocol and its functioning. …
Read More »What is IP Spoofing: Defined, Explained & Explored
Attackers and Cybercriminals widely abuse some inherent weaknesses in the communication protocols by using Spoofing. Spoofing is a type of cyber attack in which someone masquerades as a legitimate entity in the attempt to use a computer, device, or network to trick other computer networks. We will understand what is IP Spoofing and how to stay protected in this post. …
Read More »How to secure IoT devices: Challenges & Best Practices
With the growing population of IoT devices, knowing the key challenges and how to secure IoT devices is really important. IoT (Internet of Things) is the technology of the 21st Century that has revolutionized the entire world. From smart cars to smart TVs and healthcare, it has acquired it all. According to studies, the world will have 28.5 billion networked …
Read More »How to secure REST API: Best practices and tips
APIs are the backbone of today’s web and mobile development, and REST API accounts for around 80 percent. However, a recent analysis from Salt security shows that more than 90 percent of the organizations had an API security incident in the year 2020. Read on to learn how to secure REST API and RESTful API from threat actors. A REST …
Read More »How to secure legacy systems: An expert opinion
Legacy systems have long been a major concern for organizations across the globe. We have conducted thorough research and collected opinions from experts to bring you the most effective ways to secure your legacy applications and systems. As a general rule, the six-step process to Identify, Isolate, Assess, Secure, Monitor, and Modernise, is the most effective way to secure the …
Read More »Apple Airdrop Flaw and How to protect Yourself
Do you use Apple? Well if you do the chances are even if unlike me, you are not a fan of AirDrop, you would have used it a few times if not more. Here is what you need to know about AirDrop flaw. According to German researchers from Technische Universitat Darmstadt , it’s possible for strangers to discover the phone …
Read More »Legacy Systems: Disadvantages and advantages
The investigation results from the Japanese gaming company Capcom attack released recently, have once again highlighted the disadvantages of legacy systems. But what are legacy systems anyway? Legacy Systems are older applications, outdated firmware, and devices that are end of support from the manufacturer or are not updated for a really long time. If you think you do not use …
Read More »