Your Perfect Cybersecurity Partner

Stay Connected:

The Best CyberSecurity Blogs to Know in 2018| Briskinfosec
23rd June 2022 51

What is spring4shell vulnerability and how to address this vulnerability

Spring is a popular lightweight Java platform application framework that enables developers to easily create Java applications with enterprise-level features

21st June 2022 55

Is there a difference between authentication and authorization in an API?

As with web applications, APIs operate on the web, but many require some sort of authentication or authorization before you can access the valuable.

16th June 2022 123

Is CDN WAF enough to protect your web application?

What would you say if we told you that certain service was at USD 1.53 Billion in 2016 and is expected to reach USD 7.63 Billion by 2022.Is not this an exponential increase? Yes, that service is CDN WAF.

14th June 2022 89

How hackers bypass file upload and how to prevent it?

Starbucks does have the best coffee in the world. But, do they have the best cybersecurity defense? ? Johnstone discovered It was possible to execute arbitrary code by uploading a webshell

9th June 2022 147

While testing sql injection why do testers frequently use single quotes

SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications.

7th June 2022 185

What are the Best Security Practices for Cloud Platforms?

Everyone who has made a significant contribution to the field of innovation has been said to have had "their head in the clouds" at some point. After this, it's all up to you.

2nd June 2022 136

How does an organizations implementation of ISO 27001 fail?

ISO is a hot topic. You may see this abbreviation on a certificate or hear an employee say, "We are ISO certified," whenever you visit a business.

31st May 2022 321

Red vs Blue vs Purple vs Orange vs Yellow vs Green vs White Cybersecurity Team

We wanted to find out how much pros know about the different teams. We were surprised by the results of the poll about who is in charge of building .

26th May 2022 137

My Website has HTTPS implemented. Should i really worry about implementing HSTS.

HTTP and that all redirection to the site using HTTP should be changed to HTTPS requests by default.

24th May 2022 168

How To Minimize The Impact Of False Positives?

Web applications are updated on a frequent basis in today's fast-paced development settings, and agile, integrated methodologies like DevOps are swiftly becoming the norm.To design, test, and update diverse apps

17th May 2022 176

The Next New Evolution of PCI DSS-What is New in v4.0

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards formed in 2004 by Visa, MasterCard, Discover Financial Services, JCB International and American Express.

12th May 2022 128

Json web token (JWS) and its exploitation

As an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).

10th May 2022 117

80% of the backend technologies have banner exposed why is it a serious issues

Banner grabbing or active reconnaissance is a type of attack during which the attackers send requests to the system they are attempting to attack in order.

4th May 2022 358

Is Beast Attack Really Breaking Your SSL/TLS

BEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.

28th April 2022 200

Is there a way I can tell if my data of digital asset is out there?

Yes, and that magic wand is OSINT Report or Open Source Intelligence Report. It involves analyzing and reporting the exposed data on the target website...

21st December 2021 219

Security Flaws in Third Party Apps

One thing that you have to remember is that outside parties such as auditors, customers don’t care how vulnerabilities got into your environment. Even if your hands are tied, application security flaws can and likely will .

21st December 2021 237

Cyber-Security in Automotive Industry

Modern cars have dozens of computers onboard, and they are not just for running GPS or playing music. Computers monitor and control nearly every system on your vehicle, including steering.

15th December 2021 146

Importance of Cyber Hygiene in Financial sectors

The Center for Internet Security (CIS) and the Council on Cyber Security (CCS) defines cyber hygiene as a means to appropriately protect and maintain IT systems and devices and implement cyber security best practices.

15th December 2021 139

Introduction to HTTP Request Smuggling Vulnerability

HTTP Request Smuggling is one of the critical web application vulnerabilities that is often goes unnoticed by many security reasearchers and penetration testers due to its complexity.

13th December 2021 1363

What and How to address LOG4J CVE-2021-44228 Vulnerability?

CVE-2021-44228 is the name of the zero-day vulnerability, which can affect any programme that logs user input. The effect may be seen in a variety of places, including Minecraft, which registers the names of users.

16th November 2021 277

6 Cybersecurity measures that Organizations tend to overlook

Cyberattacks are a major nuisance that aren't going anywhere anytime soon. Growing at an estimated 15% year over year, cybercrime costs to organizations worldwide are forecast to reach $10.5 trillion annually by 2025.