blog

Our latest Blogs

Explore our latest blog posts and stay secure in a digital world.

Data Validation Framework – HDIV at a Glance...
Pentests

Security study has again proved that most of the web application security attacks (approx 85% as p...

Configuring ModSecurity with OWASP CRS – Part II...
Pentests

The next step is to configure ModSecurity with OWASP CRS (Core Rule Set) rules....

Configuring ModSecurity with OWASP CRS – Part 1...
Pentests

We were motivated to write about it when few of our clients just instantly asked us about blocking...

Pentesting Thick Client Apps...
Pentests

Pentesting thick client applications is not a new concept instead the techniques adopted are new a...

.NET Inherent Protection against CSRF...
Pentests

Cross Site Request Forgery is one of the most happening attacks over the internet today. The attac...

Facebook Like Widget – Spammers Tool???...
Pentests

Now a days, I get very curious to look at view-source of website where Facebook’s Like button is e...

Local Data Storage Analysis with iOS Simulator...
Pentests

There have been times when a penetration tester is not able to install iOS application on a physic...

Catching Back Doors through Code Reviews...
Pentests

Off late, code reviews have been gaining a lot of popularity. Organizations which till recently we...

Subscribe to our newsletter

Join our newsletter today and enhance your knowledge with valuable insights. It's quick, easy, and free!

Be a Team Player
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.