CALL US

+91 9116117170

Blog

What is A Trojan Horse?

By Prempal Singh 0 Comment August 5, 2022

One of history’s great literary is homer’s Iliad which tells the story of the Trojan horse.  Two thousand and some odd years later hackers use a digital Trojan horse to hide malicious files in seemingly harmless files with the intent to attack or take over your device.  A Trojan is one of the most common […]

BURP SUITE EXTENSION FOR JWT (JSON WEB TOKEN)

By Rupali Jain 0 Comment July 7, 2022

JWT – A JSON Web Token (JWT) is split into three parts; the header – The most important information in the header is the algorithm used for the signature. The main algorithms that are supported out there are: HMAC, SHA256 and RSA payload – The payload of the JWT is separated from the header and […]

Vulnerabilities that allow hackers to target blockchain and DeFi projects

By Gaurav Chauhan 0 Comment May 30, 2022

The count of decentralized finance (DeFi) and blockchain projects has increased significantly over the past year. Still, their increased popularity has also piqued cyberattackers’ interest, who managed to steal at least an estimated $1.8 billion in 2021. What is Blockchain & DeFi? The blockchain is a digital ledger that maintains transactions by a network of […]

Safe Internet Surfing Tips for Minor – Online Safety

By Rupali Jain 0 Comment May 30, 2022

Why do Minor Need Protection on The Internet? Nowadays, safety is more important not only in a physical way like in societies, cities, and countries. But yes also virtually world-like on Social media, and any technologies that we are using. The first main thing is that, all children should be educated about a few common […]

OWASP API Top 10

By Aditya Chauhan 0 Comment May 28, 2022

API1:2019 — Broken object-level authorization Attackers replace their resource ID in an API call with another user’s resource ID. The lack of proper authorization checks allows attackers to gain access to the resource. This attack is also known as IDOR. Use case The sequence of API calls uses the ID of the resource available to […]