VAPT

Top 10 Web Application Vulnerabilities and How to Mitigate Them

The inability to identify vulnerabilities in a web application can leave it unprotected against potential attackers, resulting in the mostContinue…

3 weeks ago

Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service

Hungarian financial institutions and telecoms infrastructure suffered a cyber attack on Thursday, last week. According to Magyar Telekom, the attackContinue…

2 months ago

Eterbase Exchange Hacked: Hackers Stole $5.4 Mn

Eterbase Exchange, a popular Slovakian cryptocurrency exchange platform was hacked by threat actors, on September 8, 2020. Reportedly, $5.4 MillionContinue…

3 months ago

Cyberattackers Target Norwegian Parliament

The Norwegian Parliament, also known as the Storting, made an extremely shocking revelation by issuing a press release at theContinue…

3 months ago

Secure Code Review – A Necessity

What is a Secure Code Review? Secure Code Review is the process to check the code in the development phaseContinue…

5 months ago

SQL Injection Attack: A Major Application Security Threat

What is SQL Injection (SQLi) and SQL Injection Attack? If you are quite familiar with the cyber world then youContinue…

6 months ago