Blogs

Home / Blog

Importance of automation in SOC

Security Operation Centers (SOC) are evolving in all types of organizations across just about every industry verticals....

Read More

Role Of SOC In PCI DSS

What is PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and...

Read More

Mobile application penetration testing

Mobile Applications have become an essential part of our lives as our dependence on smartphones has grown. But many users...

Read More

SOC – Cyber Threat Intelligence Analysis

In the current era of security threat attacks and cyber warfare, it comes as a vital need to persistently monitor and...

Read More

DNA Hack

Researchers from the University of Washington say they have successfully hacked into a computer using custom strands of DNA...

Read More

Social engineering penetration testing – part II (attack vectors)

Phishing The target/victim is manipulated with the appearance possessed by the attacker that he/she represents a legitimate...

Read More

Social Engineering Penetration Testing – Part 1 (Attack Cycle)

RECONNAISSANCE Attack vectors are determined by the information gathered. Information from the target/victim can be...

Read More

Ransomware: How to Protect Yourself

Ransomware malware encrypts the organization or individual data for extorting ransom amount from the victim. The malicious...

Read More

IoT Security Analytics

Enhanced situational awareness and Optimized resource consumption are the major benefits Internet of Things (IoT) is...

Read More