CALL US

+91 9116117170

Blog

What is Black Box Testing

What is BLACK Box Testing? Techniques, Example & Types

By Prempal Singh 0 Comment August 16, 2021

What is Black Box Testing? Black Box Testing is a way of testing software’s functionalities without any prior knowledge of its internal code structure, internal paths and implementation details. The tester enters an input and analyses the output generated by the software. Hence, the response of the software to user actions, its response time, reliability […]

Top 10 VAPT Companies in India

Top 10 VAPT Companies in India

By Yashika Sharma 0 Comment July 22, 2021

Owing to the increasing demand for security against cyber-attacks, many cybersecurity companies have evolved in India over time. Some of these companies have achieved a great deal of success due to their up-to-date and robust cybersecurity solutions.  Before choosing a company for pentesting, have a look at the list of top 10 VAPT Companies in […]

Pegasus Spyware

Pegasus Spyware – The Most Refined Malware of All Times

By Prempal Singh 0 Comment July 22, 2021

What is Pegasus? Pegasus, spyware developed to help the government authorities against crime, is set to become the ‘most sophisticated smartphone attack ever’. The Pegasus software was first recognized in 2016 and is allegedly developed by NSO Group, an Israeli company. According to the official website of the NSO group, they develop software to assist […]

What is JSON Web Token (JWT)?

By Vedant Jain 0 Comment May 24, 2021

Token-Based Authentication The token-based authentication systems allow users to enter their username and password in order to obtain a token which allows them to fetch a specific resource without entering their username and password at each request. JSON Web Token JWT is also know as JSON Web Token. JWT is a way to communicate between […]

What is CSV Injection?

By Vedant Jain 0 Comment May 18, 2021

The Full form of CSV is Comma Separated Values which basically used for storing data in form Tables (Columns & Rows) in the plain text format. An overview of CSV Injection commonly known as formula Injection comes when websites embedded untrusted input inside CSV files a lot times these formulas are caused because of certain […]

error: Content is protected by Cyberops !!