World’s largest companies have adopted to DMARCs reject policy

Large companies across the world receive phishing emails every day. There are a number of these companies who are still not aware of DMARC, however, a large number of big companies have started following DMARC policies. Companies that have adopted DMARC have seen impressive results in the fall of suspicious emails entering the company domain […]

Continue reading


Mitre ATT&CK Framework: A boon to your company’s Red Team

MITRE ATT&CK

The MITRE ATT&CK Framework has become increasingly popular over the last few years. It was originally developed to support Mitre’s cyberdefense work but at this point it is both an enormous knowledge base of cyberattack technology and tactics and a model for understanding how those elements are used together to penetrate a target’s defenses. The […]

Continue reading


Are your website images secured?

googleusercontent

Malware can enter your machine through corrupted images on any website. Malware is stored in Exchangeable Image File Format (EXIF) data. Recently instances have occurred where in hackers are hiding malware in the images and uploading such images to the Google’s official CDN (Content Delivery Network) – googleusercontent.com. How malware is embedded in an image? […]

Continue reading


Why you must switch to HTTPS right now?

Secure your website with HTTPS

It is high time to switch to HTTPS. The most important question lingering here is Why to move to HTTPS? To understand why, first we need to understand what is HTTPS? The Hypertext Transfer Protocol (HTTP) is an application protocol for communication over distributed, collaborative, and hypermedia information systems. HTTPS (HTTP Secure) is an adaptation of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is […]

Continue reading


Avoiding the rising DNS Binding Attacks for the smart devices

Is your device safe from DNS Rebinding Attack_

What is a DNS Rebinding Attack? DNS Rebinding Attacks are where the attacker tricks the user into binding with malicious websites and then making the user browser or device access unintended domains. Such attacks are normally used to compromise the system and exploit it as proxy for attacking the internal network. How DNS Rebinding Attacks […]

Continue reading