Skip to main content

Posts

Showing posts from May, 2021

Event Alert : Threat Intelligence Summit (No Paid Promotion)

SecurityWeek’s Security Summit events are a series of topic-specific virtual conferences that allow attendees from around the world to immerse in a virtual world to discuss the latest cyber security trends and gain insights into security strategies and emerging cyber threats faced by businesses. Attendees   can immerse themselves in a virtual environment to discuss the latest cyber security trends and gain insights into security strategies and emerging cyber threats faced by businesses. Through a cutting-edge platform, attendees can interact with speakers and sponsors, and visit networking lounges, specific zones & sponsor booths. ( Register now to join the virtual experience ) SecurityWeek’s   Threat Intelligence Summit   is a virtual conference that allows attendees from around the world to immerse in a virtual world to explore and discuss the latest trends and insights on cyber threat intelligence (CTI).  Days: 25th & 26th May, 2021 Hot Topics Day1 Fireside Chat With Thomas

Stay safe.. Stay Home .. Stay safe Online - Covid19 and Cybercrime

 Whole world is facing horrible pandemic now a days due to Covid19.  Including US, India, European countries are trying to control the situation by implementing full forced action to reduce the impact and save lives.  When I am writing this, vaccine has been invented and countries are sharing various resources and helping each other by most possible way.  Along with this pandemic we have seen ample amount of humanity and compassion. People, Government, NGOs have tried to help to the needy. Donations of millions, help in infrastructure, medicine, vaccine, food etc shared on voluntary basis. Government is conducting huge vaccination drive and sharing all possible resources in the country.  However, there is an old relation between angels and deamons. Along with this huge wave of humanity there are many fraudsters taking advantage of the situation. They try to trick the helpless individual using various ways to commit the fraud. Into this article we will disclose few frauds and learn to s

What Is SQL Injection (SQLi) - Why Top Threat for Application ?

  I n today’s world cyber-attacks are triggered to alter or steal the information of a person or an organization in a huge volume of data. It is very much important to protect the data/database from security related attacks. SQL injection is one of the top trending cyber attack techniques recognized by  the  world’s top non-profit security foundation OWASP (Open Web Application Security Project). SQL injection attack s  are made  by inserting or injecting the  SQL  query input from the client end of the application. In this article, we will learn about the  SQL  injection, types of attacks using  SQL  injection and preventive steps.    What is SQL Injection?   SQL injection attack  is  used to insert malicious SQL statements into an entry field for execution. This injection technique is the most common web application hacking attack that allows an attacker to get unauthorised access,  commit  identity spoofing,  t amper , take control or destroy your database. This is  an attack that i

Beginner's Guide to Penetration Testing

Since you are here to read this article,  we assume that you are already aware of the term s  “hacking” ,  “hackers”  and other words associated with unauthorised access.  Penetration testing  or ethical hacking  is the process of attempting to gain access  in to target resources  and perform actual attacks  to  find loopholes  in  the system  and  measure  the  strength of security. In this article we will learn about penetration testing, its requirements and  understand how real world  ethical hackers perform hacking attacks. Penetration testing  ( also called pen testing )   and Vulnerability Assessment are both individual activities. Vulnerability assessment is  carried out  to identify the vulnerability  of  the system or network and patch that particular vulnerability with  the creation of some  controls.  Read More https://www.knowledgehut.com/blog/security/penetration-testing-guide