The Era of Cyber ​​Threat Information Sharing

We have spent 40 years protecting ourselves as individuals. We tried to trick and outsmart the cybercriminals, but when all our efforts failed, we thought of working with our peers to outnumber them. Cybercriminals don’t remake themselves every time. They have limited resources and limited budgets. So they use playbooks to attack a lot of […]

Why is Robust API Security Important in Ecommerce?

API attacks are on the rise. One of their main targets is e-commerce businesses like yours. APIs are an integral part of how e-commerce businesses accelerate their growth in the digital world. E-commerce platforms use APIs at every customer touchpoint, from browsing products to processing deliveries. As the following diagram shows, API usage is on […]

24% of Technology applications contain high-risk security vulnerabilities

With a higher percentage of applications arguably processed than other industries, technology companies can benefit from implementing improved secure coding training and practices for their development teams. In fact, Veracode revealed that 24% of applications in the technology sector contain vulnerabilities considered high-risk. “Expanding software security intuition by providing developers with hands-on experience of what […]

Android Application Penetration Testing – Part 1

[et_pb_section admin_label=”section”] [et_pb_row admin_label=”row”] [et_pb_column type=”4_4″] [et_pb_text admin_label=”Text”]   After web applications more concern area is mobile application penetration test Let’s start with some basics- Basic architecture for android device Linux kernel For hardware, we always required drivers as software so that those hardware can smoothly work. We choose Linux kernel because it has Security […]