CALL US

+91 9116117170

Category: Articles

Top 10 VAPT Companies in India

Top 10 VAPT Companies in India

By Yashika Sharma 0 Comment July 22, 2021

Owing to the increasing demand for security against cyber-attacks, many cybersecurity companies have evolved in India over time. Some of these companies have achieved a great deal of success due to their up-to-date and robust cybersecurity solutions.  Before choosing a company for pentesting, have a look at the list of top 10 VAPT Companies in […]

What is JSON Web Token (JWT)?

By Vedant Jain 0 Comment May 24, 2021

Token-Based Authentication The token-based authentication systems allow users to enter their username and password in order to obtain a token which allows them to fetch a specific resource without entering their username and password at each request. JSON Web Token JWT is also know as JSON Web Token. JWT is a way to communicate between […]

New iPhone and Mac-book camera hack

By Devashish Soni 0 Comment April 4, 2020

If you are using iPhone, MacBook or Apple, here is a piece of alarming news for you Turns out that merely visiting a website — not just malicious one also the legitimate sites unknowingly loading malicious ads on them can give access to your device’s location, microphone, your camera, and in some cases, saved passwords […]

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

NordVPN Patches Flaw That Exposed Users’ Details

By Aneesh A S 0 Comment March 11, 2020

NordVPN, one of the most popular VPN services, has fixed a security flaw that existed in its payment systems. The vulnerability is said to have exposed customers’ email addresses and other information.  The vulnerability was linked to the three payment platforms ,  Momo, Gocardless, and Coinpayments ; used by NordVPN. The flaw was disclosed by […]

error: Content is protected by Cyberops !!