Cyber Threat Intelligence

With cyber threats becoming increasingly difficult to track and manage, proactive security approach must be taken in order to protect their assets from a breach. This requires ongoing visibility into…
D3FEND Project On MITRE

D3FEND Project On MITRE

D3FEND is available through the non-profit MITRE Corporation as a catalog of defensive cybersecurity techniques and their relationships to offensive and adversary techniques to help standardise the vocabulary used to…
Penetration Testing Standards

Penetration Testing Standards

While going through penetration testing process, its worthwhile to post on standards and framework been followed . Below are few standards that getting followed in Penetration Testing process. 1. OSSTMM…

Business Process Compromise

Attackers look for vulnerable practices or operational loopholes to find a entry into business. Once they have found a vulnerability, the attacker will alter part of the process to their…