Know Our Story















Get all our latest, trending content delivered fresh to your inbox
Articles
-
What is a Second-Order SQL Injection and how to identify Attack Scenario, Potential Impact and Remediation!
What is SQL Injection? SQL Injection — the process of injecting SQL language code within data requests that result in application backend database server either surrendering confidential data or cause the execution of malicious scripting content on the database that could result in a complete compromise of the host. SQL injection is one of the
January 18, 2021 -
5 Team-building activities to make remote meetings more engaging in 2021
Remember when you could go to a colleague’s office to ask a question! Or you could quickly bring a team together for an emergency brainstorming session! Today, COVID-19 has put an end to this spur-of-the-moment interaction and replaced it with back-to-back remote meetings. Meetings are a vital aspect of team collaboration. Be it an All-Hands
January 8, 2021 -
Methods to bypass a 2FA in Web/Mobile Applications
Two-factor authentication (2FA) adds an extra layer of security to the login accounts by asking for a verification code after you sign in with your email address and password. Two-Factor Authentication is the best way to protect your account even if your login credentials are being compromised. This Authentication method provides secure access to the
November 18, 2020 -
CSRF token? Why not try to bypass it?
Cross-Site Request Forgery (aka CSRF) attack is one of the common web application security vulnerabilities. The application uses an anti-CSRF token to prevent this attack, but due to improper validation of these tokens at the server-side, an attacker may bypass this protection. Even though the application has an anti-CSRF token present, there is still a
November 18, 2020
Would you like to speak to us over the phone? Just submit your details and we’ll be in touch shortly. You can also email us if you would prefer.