Your Perfect Cybersecurity Partner

Stay Connected:

Cybersecurity Blogs | Briskinfosec
2nd August 2022

Word-press plugin lightspeed caches security flaws and how to exploit them

WordPress plugin LiteSpeed Cache has a cross-site scripting vulnerability because it does not properly sanitize user input. An attacker can take advantage.

5th July 2022

What Is FTP Penetration Testing and What It Is Not?

File transfer protocol, a standardized protocol used to allow transmission of files between computers. It consists of a set of coded signals which are transmitted between computers, and which inform

30th June 2022

How to save yourself from Phishing attacks? A quick guide!

Phishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It

28th June 2022

Do you postpone the windows patch update?

If you do postpone, you might want to read this one. Many employee’s in the organization are using the old unpatched server, because of the blue screen error, system restart & update time.

9th October 2018

Sparta

Sparta is a Python based GUI application and it’s a network infrastructure pentesting tool by aiding the pentesters in performing scanning and enumeration phase

9th May 2019

DNS Zone Transfer

In the world of networking, computers don’t go by names like humans. Instead, they go by numbers. Computers identify and communicate with each other over a network by means of some unique numbers called as IP (Internet Protocol) addresses.

27th May 2019

WPA3-Wi-Fi Protected Access

Every generation of our technology assures new security promises but parallelly generates the room for new problems. The present world allows users to connect to powerful mainframes, but unfortunately also allows intruders to discover ways to gain access towards user information, tamper the passwords, and in manipulating the access rights.

1st June 2019

FTP Penetration Testing

Well, this blog will describe the possible ways to attack the FTP servers to compromise your files or the internal network of the organization, how the attacker would try to exploit the FTP, and best possible ways to defend the attack.

8th July 2019

Android Manifest File Analysis 101

Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

30th September 2019

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

18th October 2019

What Do You Need To Know About Cyber Kill Chain?

The Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).

6th November 2019

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

26th November 2019

Detailed Insights On Ipv6 Implementation And Its Security Related Aspects

Internet Protocol (IP) is a system that allows hosts to identify and connect to other hosts online. Ipv4 was implemented in the early 80s.

29th April 2020

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

26th June 2020

Beware of NetWire RAT Malware spread via Microsoft Excel 4.0 Macro

Excel is a spreadsheet developed by Microsoft that features calculation, graphing tools and macro program language.

23rd September 2021

Why CIS Harden images should be matters for better security?

CIS Benchmarks are frameworks for calibrating a range of IT services and products to ensure the highest standards of cybersecurity. They’re developed through a collaborative process with input from experts within the cybersecurity community

23rd September 2021

CIS Benchmarks are frameworks for calibrating a range of IT services and products to ensure the highest standards of cybersecurity

Enterprises have been able to achieve new digital heights thanks to the public cloud, which has enabled them to establish dynamic and scalable operations

2nd November 2021

Identification and Exploitation of CVE 2021-41773 Apache Vulnerability

Apache is one of the most popular open-source web servers available in the market for both Windows and Linux operating systems. It is one of the reliable and flexible web.

10th May 2022

80% of the backend technologies have banner exposed why is it a serious issues

Banner grabbing or active reconnaissance is a type of attack during which the attackers send requests to the system they are attempting to attack in order.

23rd September 2021

What is the Difference Between AWS Vs Azure Vs Google from a Cloud Security Standpoint

These services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware

13th December 2021

What and How to address LOG4J CVE-2021-44228 Vulnerability?

CVE-2021-44228 is the name of the zero-day vulnerability, which can affect any programme that logs user input. The effect may be seen in a variety of places, including Minecraft, which registers the names of users.