Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • Infrastructure Security Testing
    • IoT Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Secure Development – Web
    • Secure Development – Mobile
  • Resource
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Monthly Archives: September 2021

  • Home
  • Archives
September 28 2021
  • CyberNews

Top CyberNews September 2021 – Week 4

Cyberthreats are getting higher every year. Here are some that will get your attention. Android Malware Steals Financial Data from […]

Read More
September 21 2021
  • CyberNews

Top CyberNews September 2021 – Week 3

Ransomware, WordPress Plugin Vulnerability, and network compromise. This week’s cyber news update is all over the place. Honing Cybersecurity Strategy […]

Read More
September 17 2021
  • Blog

Phishing

Phishing is a form of social engineering where an attacker masquerades as a reliable entity or asset and tries to […]

Read More
September 14 2021
  • CyberNews

Top CyberNews September 2021 – Week 2

After the pandemic, there have been new cyber breaches across the globe. Given the sensitivity of data that is being […]

Read More
September 11 2021
  • CyberNews

Top CyberNews September 2021 – Week 1

After the pandemic, there have been new cyber breaches across the globe. Given the sensitivity of data that is being […]

Read More
September 10 2021
  • Blog

Insufficient Logging And Monitoring

Lack of logging and monitoring the threats to the application from time to time causes massive problems. It may lead […]

Read More
September 9 2021
  • Blog

Using Components With Known Vulnerabilities

Usage of third-party software components in the development process may lead to this type of attack. Known components like third-party […]

Read More
September 8 2021
  • Blog

Insecure Deserialization

What is Serialization? During the development of web applications, some objects need to be transferred. Objects contain a bunch of […]

Read More
September 7 2021
  • Blog

Cross-site Scripting

A cross-site Scripting flaw occurs whenever the attacker makes use of DOM and API to retrieve data or send commands […]

Read More
September 6 2021
  • Blog

Security Misconfiguration

Misconfiguration occurs whenever the system fails to meet the security framework standards. It may occur at the application server-side, application […]

Read More
  • 1
  • 2

Recent Posts

  • Top Cyber News April Week 3
  • Top Cyber News April Week 2
  • Data security in cloud computing
  • Cybersecurity For Fintech – Finance Industry
  • Top Cyber News April Week 1

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
  • WAF
© Copyright 2020. Anada WordPres Theme By WordPressRiver
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}