Pegasus – A Sophisticated Spyware Tool
Pegasus is a spyware hacking software suite basically used for the surveillance of individuals that can be secretly installed on mobile phones and other devices that run iOS and Android…
SonicWall Warns Ransomware Attack on their Appliances
SonicWall, majorly a cybersecurity company issued an urgent security notice to the customers of an imminent Ransomware attack targeting their network products – Secure Mobile Access (SMA) 100 series and…
CVE:Common Vulnerabilities & Exposures-A Database of Vulnerabilities
The Common Vulnerabilities and Exposures (CVE) is the collective list of security flaws with unique identifiers given to the publicly known security vulnerabilities and exposures. Each flaw carries an identification…
SolarWinds Hack–One of the Biggest Attack of the Century
One of the biggest cyberattacks of the 21st century which was recently discovered that targeted US government organizations and companies. In fact, it is declared a global cybersecurity breach. Hackers…
CVSS Scoring – A Vulnerability Metrics
The Common Vulnerability Scoring System (CVSS) is a numerical scoring system indicating the severity of an information security vulnerability. These scores are generally used by info security teams as part…
Peerlyst – A Cyber Security Platform is Shutting Down
Peerlyst is a social network exclusively for security professionals. It is an unbiased platform for security news, product reviews, discussions, and networking. Users range from consultants to CISOs, making us the…
Vulnerability Assessment & Management Procedure SOP
Objectives for Vulnerability Assessment & Management SOP: This document establishes the Standard Operating Procedure (SOP) for performing Infrastructure Vulnerability Assessments and remediation of identified vulnerabilities. A Vulnerability Management process is…
How to Create a Strong Password and its Best Practices
Password is a key to your identity hence create the password strong enough that nobody can guess it or crack it. Below are some of the strong, unique, and secure…
Apple iOS Mobile Application Security – Best Practices
Security in Smartphones: In today’s world, security in smartphones is one of the most important elements for mobile companies. As people are almost completely dependent on technology, they deal with…
What is VAPT-Vulnerability Assessment and Penetration Testing?
Vulnerability Assessment and Penetration Testing (VAPT) are both different types of software security testing performed to identify and quantify the security vulnerabilities in the network, server, and software applications. In…