Penetration Testing Standards

Penetration Testing Standards

While going through penetration testing process, its worthwhile to post on standards and framework been followed . Below are few standards that getting followed in Penetration Testing process. 1. OSSTMM…
Chinese lures India with Tata motors Gift

Chinese lures India with Tata motors Gift

China-based hackers are running a malicious free gift campaign to collect personal user data. Cybersecurity researchers have revealed that the campaign is pretending to be an offer from Tata Motors,…

Wireless Security protocols Evolution

While going through the various Wi-Fi attacks, it’s worthwhile to combine them in a single post. This post discusses about the various Wi-Fi standards that evolved and evolving in networks.…

Patch Tuesday June 2021

Microsoft has released 50 security fixes for software to resolve critical and important issues including six zero-days that are being actively exploited in the wild. 5 of the vulnerabilities are considered…

Operation Trojan Shield

The US FBI, the Dutch National Police (Politie), and the Swedish Police Authority (Polisen), along with the US Drug Enforcement Administration (DEA) and police from 16 other countries have carried…
Domain Hiding

Domain Hiding

In earlier post , Domain Fronting technique has been discussed, since the Webservices giants blocked the technique . A concept of Domain hiding came to lime light A new technologies…