+91 9116117170

Tag: vulnerability assessment

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Chandan Singh 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

Most vulnerability first disclosed online and in the darknet

By Chandan Singh 0 Comment June 10, 2017

More than three-fourths of the vulnerabilities disclosed online before making the National Vulnerability Database (National Vulnerability Database, NVD). News sites, blogs, and social networks, as well as the darknet details about security issues in the software, are published more frequently than in the NVD. That is the conclusion reached by experts of the company Recorded […]

VMware Patches Critical Vulnerabilities in v Sphere Data Protection

By Chandan Singh 0 Comment June 10, 2017

VMware fixed two critical weaknesses in its vSphere Info Protection solution this week that could have allowed an attacker to perform commands on the virtual appliance, among other results. The Department of Homeland Security’s CERT encouraged users and admins on Wednesday to apply the improvements. vSphere Data Protection is a backup solution use with vSphere […]

Multiple Vulnerabilities Found in Popular IP Cameras

By Chandan Singh 0 Comment June 8, 2017

The vulnerabilities, 18 in all, were uncovered by F-Secure, who specifically found them in the Optical i-5 and Foscam C2 digital cameras. F-Secure warns, however, that these vulnerabilities will likely exist throughout the Foscam range and potentially in all 14 separate brands that it knows to sell Foscam cameras. The flaws include insecure standard credentials, […]

46% of zero-day vulnerabilities exploited in Microsoft products

By Chandan Singh 1 Comment June 8, 2017

Targeted attacks on companies and government agencies are no longer a curiosity. Almost every day we learn about the malicious activity or leakage of data, as well as read about cyber espionage, which in turn accused the Russian, the Chinese hackers. However, not all attackers manage to infiltrate a corporate network and steal important data. […]

error: Content is protected by Cyberops !!