Infovore CTF
Infovore CTF

We start with another boot2root machine from Vulnhub. This machine … Read More
InfoSec Prep: OSCP
InfoSec Prep: OSCP

This virtual machine I found on Vulnhub – InfoSec Prep: … Read More
Bridge letter and its significance in a SOC Report
Bridge letter and its significance in a SOC Report

While most of you may be aware of SOC reports … Read More
Key elements to consider in a PCI DSS Card Data Discovery Process
Key elements to consider in a PCI DSS Card Data Discovery Process

Over the past few years, the industry has witnessed several … Read More
Difference Between Vulnerability Assessment & Penetration Testing
Difference Between Vulnerability Assessment & Penetration Testing

While many professionals claim to be aware of the Vulnerability … Read More
PCI DSS Compliance For Remote Access During COVID-19 Pandemic
PCI DSS Compliance For Remote Access During COVID-19 Pandemic

As the COVID-19 pandemic continues to spread across the world, … Read More
A Detailed Guide on HTML Injection
A Detailed Guide on HTML Injection

HTML is considered as the skeleton for every web application, … Read More
What is Penetration Testing and Which Test Applies to Your Business?
What is Penetration Testing and Which Test Applies to Your Business?

Penetration tests which are also known as the Pen Test … Read More
A Guide to NESA’s Audit & Compliance Process
A Guide to NESA’s Audit & Compliance Process

NESA ‘s IAS Standards are a threat-based approach that guides … Read More
Testing The Business Continuity Plan
Testing The Business Continuity Plan

Business Continuity Plan is a process of recovery and prevention systems … Read More
Fetching Database on Mobile Devices via Terminal
Fetching Database on Mobile Devices via Terminal

One of the most common and probably the most essential … Read More
What are the Best Practices for Securing E-commerce Business?
What are the Best Practices for Securing E-commerce Business?

E-commerce businesses have exponentially flourished over the past decade. With … Read More
What is Insufficient Logging & Monitoring and How Can it Be Prevented?
What is Insufficient Logging & Monitoring and How Can it Be Prevented?

When it comes to exploitation of cybersecurity, insufficient logging and … Read More
Importance of Business Continuity Plan
Importance of Business Continuity Plan

When a disaster strikes it just strikes hard without giving … Read More
PCI DSS 4.0 Updates
PCI DSS 4.0 Updates

PCI DSS 4.0 is the latest version of the Payment … Read More