Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • Infrastructure Security Testing
    • IoT Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Secure Development – Web
    • Secure Development – Mobile
  • Resource
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Blog

  • Home
  • Blog
January 21 2022
  • CyberNews

Top Cyber News January 2022 – Week 3

Cyber news this week includes Cyberattack on Red Cross Log4j used to deploy WhisperGate malware  Europol shuts down VPNLab.net Cyber […]

Read More
January 20 2022
  • Blog

What is SAST?

SAST – Static application security testing Static Application Security Testing (SAST) is a popular Application Security (AppSec) tool that checks […]

Read More
January 6 2022
  • CyberNews

Top Cyber News January 2022 – Week 1

New year starts with new ransomware attacks and many more. Read the top cyber news of 2022 January week 1. […]

Read More
January 6 2022
  • Blog

Top 10 Cyber trends of 2021

1. The Number of Ransomware Attacks Is Increasing Ransomware has continued to grow and change in 2021, making it one […]

Read More
December 29 2021
  • Blog

Top 10 Cyberattacks That Took 2021 By Storm

1. COLONIAL PIPELINE CYBER ATTACK. Colonial Pipeline, an American oil pipeline system in Houston and Texas, transports gasoline and jet […]

Read More
December 27 2021
  • Blog

What is a Web Shell?

Web Shell A web shell is a shell-like interface that allows a web server to be accessed remotely. Web Shells […]

Read More
December 22 2021
  • CyberNews

Top CyberNews December 2021 – Week 4

Cybersecurity news for the week The year 2021 has come to an end, log4j vulnerabilities have taken the entire world […]

Read More
December 22 2021
  • Blog

Cybersecurity for kids – Is it essential?

Why are kids targeted in hacking? Cybersecurity for children can be a great step towards good parenting. Kids prove to […]

Read More
December 21 2021
  • Blog

Log4j – Zero-day vulnerability

Log4j – A new java-based vulnerability has been uncovered

Read More
December 20 2021
  • Blog

Application Security Testing

What is application security testing? Application security testing is the process of detecting, repairing, and improving security practices to protect […]

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 9

Recent Posts

  • Top Cyber News April Week 3
  • Top Cyber News April Week 2
  • Data security in cloud computing
  • Cybersecurity For Fintech – Finance Industry
  • Top Cyber News April Week 1

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
  • WAF
© Copyright 2020. Anada WordPres Theme By WordPressRiver
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}