CALL US

+91 9116117170

Category: Cyber Security Terminology

Pegasus Spyware

Pegasus Spyware – The Most Refined Malware of All Times

By Prempal Singh 0 Comment July 22, 2021

What is Pegasus? Pegasus, spyware developed to help the government authorities against crime, is set to become the ‘most sophisticated smartphone attack ever’. The Pegasus software was first recognized in 2016 and is allegedly developed by NSO Group, an Israeli company. According to the official website of the NSO group, they develop software to assist […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

Risk Assessment Process - Cyberops

Information Security: Risk Assessment & Treatment

By Annu Choudhari 0 Comment September 7, 2019

Risk assessment (often called risk analysis) is perhaps the most difficult part of implementing ISO 27001, but at the same time, risk assessment (and its processing) is the most important step at the beginning of your information security project – it establishes the basis for information security in your company. The question is – why […]

Owasp top 10 A:9

Owasp Top 10:A9: Using Components With Known Vulnerabilities (Impact & Mitigation)

By Annu Choudhari 0 Comment July 9, 2019

What does mean by “Components With Known Vulnerabilities” ? Web services often include a component with a known security vulnerability. When this happens, it falls into this category, no matter which component is vulnerable, which makes it a very frequent discovery. A component with a known vulnerability may be the operating system itself,the Content Management […]

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Mohammed Tahir 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

error: Content is protected by Cyberops !!