Author: Admin

Website Penetration Testing

In the previous tutorial, we had an overview of Website Security. So in this tutorial, we are providing you with the details of website penetration testing and why and how it is related to website security. Even though we say website penetration testing, it is not that simple as said as there are a lot

Read More
Firewall Penetration Testing – Part I

A Firewall is a hardware or software program that monitors and controls the incoming and outgoing network packets/traffic based on the set of rules made. A Firewall is thus a Network Security System that helps in protecting the network environment from various forms of threats like hackers, worms, viruses, etc. that try to reach your

Read More
Simple Approach To Penetration Testing For Fintech’s

This article deals with what is Fintech and Fintech Penetration Testing. Fintech is a new name trending in the media and technological area. Even though this industry has been from the previous decade till many tech savvy’s are not aware of what is Fintech as it is a term getting popularized now. Fintech or Financial

Read More
SOC2 Compliance – Penetration Testing

SOC means Service Organization Control and SOC2 Compliance is one of the industry standards given for service organizations that are into technology, cloud service, etc. SOC2 Compliance Audit is done to differentiate you from other organizations identifying the validity of the controls, policies, and standards set forth without affecting the client’s internal controls over reporting and thus giving your clients the assurance to

Read More
Hackers Spread BIOPASS Malware through Chinese Online Gambling Sites

Cybersecurity analysts are cautioning about another malware that is striking web-based betting organizations in China through a watering opening assault to send either Cobalt Strike reference points or a formerly undocumented Python-based secondary passage considered BIOPASS Rodent that exploits Open Telecaster Programming (OTP) Studio’s live-streaming application to catch the screen of its casualties to assailants.

Read More
Firewall Penetration Testing – Part II

A firewall is a device that controls what get in and come out of our infrastructure network. The firewall is placed in between an organization network and the outside world. Testing for a firewall is basically an important part of penetration testing and in a security audit. Network scanning is the initial activity that should

Read More
Apple macOS High Sierra Security Vulnerability

A bug that allows anyone a blindingly easy method of breaking that operating system’s security protections. Anyone who hits a prompt in Apple macOS High Sierra asking for a username and password before logging into a machine with multiple users, can simply type “root” as a username, leave the password field blank, click “unlock”, and

Read More
Fix Apache Struts 2 (CVE-2018-11776)

Apache Struts is all over again within the news for critical bugs in its code, and also the Apache software Foundation declared a critical remote code execution vulnerability within the widespread open-source framework for developing internet applications in Java. The vulnerability ID, assigned CVE-2018-11776 was first discovered in April of this year is a group

Read More