Penetration Testing Tools

Penetration Testing Tools

While going through Penetration Testing, it's worthwhile to writeup a post on tools widely used in the various categories Testing Tools are categorised mainly in to five categories Information GatheringWeb…
Cloud Native App Sec

Cloud Native App Sec

A recent survey from Dynatrace revealed that the growing importance of cloud-native architectures, DevOps, and agile methodologies are driving towards a new approach, that is optimized for multi-cloud environments, Kubernetes…
Critical Flaws in CODESYS

Critical Flaws in CODESYS

Cybersecurity disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to remote code execution on programmable logic controllers (PLCs). To exploit this only network…

FAST…. 🚀App Sec

In last post we have discussed on one of the Application testing technique RASP , its functionality , importance, methods . Today we will discuss about another hidden technique used…
RASP ⏳App Sec

RASP ⏳App Sec

Many of us came across SAST, DAST, IAST Application testing methodoloy. But we may not came across RASP on frequent basis. Though the method is nearly a decade old one…
Adobe Reader Exploit goes Wild

Adobe Reader Exploit goes Wild

Adobe has released a security update to address a vulnerability labelled as CVE-2021-28550 affecting both Windows and Mac versions of Acrobat DC, Acrobat Reader DC, Acrobat 2020, Acrobat Reader 2020,…
Drone Hack on Tesla

Drone Hack on Tesla

The analysis was initially carried out for the Pwn2Own 2020 hacking competition the contest offered a car and other significant prizes for hacking a Tesla but the findings were later…