Category: penetration-testing

Work Diary – SystemBack & Third Party Security Tools
BugBountywriteup, cybersecurity

Work Diary – SystemBack & Third Party Security Tools

I have recently joined a startup and have been a part of their InfoSec team. Recently this thought popped up in my mind that I ... Read More

How I hacked into a college’s website again!
BugBountywriteup, cybersecurity

How I hacked into a college’s website again!

This is a follow up article to the previous piece that I wrote - How I hacked into a college’s website to obtain the student’s ... Read More

Why Mobile-First Businesses Must Invest in App Security
DevSecOps, Industry News

Why Mobile-First Businesses Must Invest in App Security

Why Mobile-First Businesses Must Invest in App Security Mobility has revolutionized the way customers interact with brands and paved the way for mobile-first businesses. We ... Read More

How I hacked into my college’s database!
BugBountywriteup, burpsuite

How I hacked into my college’s database!

How I hacked into a college’s database!This article is being re-published, originally published on 13th April 2018.Being a teenager I have heard computer nerds proudly claiming ... Read More

Work Diary – Research work & Deployment of Security Policies
BugBountywriteup, DevOps

Work Diary – Research work & Deployment of Security Policies

I just recently joined a startup and have been a part of their InfoSec team. Recently this thought popped up in my mind that I ... Read More

Get the Inside Track on Presenter & Session Details for NowSecure Connect19
DevSecOps, Federal Government

Get the Inside Track on Presenter & Session Details for NowSecure Connect19

Get the Inside Track on Presenter & Session Details for NowSecure Connect19 Our flagship gathering NowSecure Connect 2019 — the premier event for mobile DevSecOps ... Read More

Peering Inside the Mobile Attack Surface
Best Practices, mobile app security

Peering Inside the Mobile Attack Surface

Peering Inside the Mobile Attack Surface Application security managers are keenly aware of an abundance of mobile threats that can result in data loss, identity ... Read More