Skip to content

others

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains

Adopting Generative AI In Cyber security

Adopting Generative AI In Cyber Security

In recent years, generative AI has gained significant attention across industries. While it has shown amazing results in applications like image generation, text synthesis, media generation, transformation of content between different media etc, the field of cybersecurity has recently started warming up to the idea of using Generative AI. The question is: Where in cyber… Read More »Adopting Generative AI In Cyber Security

FC Attacking Modern Web Applications

Attacking Modern Web Applications

In the realm of contemporary of Modern web applications, the prevalent architectural framework of choice often takes the form of microservices architecture. In this context, what appears to be a unified front-end application is essentially an amalgamation of numerous small, distinct micro-services on the back end, interconnected through a reverse proxy mechanism. Consider, for instance,… Read More »Attacking Modern Web Applications

Burp Intruder alert

Mastering Burp Intruder Attack Modes: A Comprehensive Guide for Web Security Professionals

Burp Intruder is a powerful tool included in the Burp Suite, a widely-used web vulnerability scanner and penetration testing tool. It allows security professionals to automate various types of attacks against a web application. One of its most essential features is the ability to perform attacks in different modes, each tailored for specific purposes. In… Read More »Mastering Burp Intruder Attack Modes: A Comprehensive Guide for Web Security Professionals

5 Sessions That You Can’t Miss @ GISEC Global 2022

GISEC 2022 has multiple tracks… So we have put together a list of 5 talks that you cannot miss! >>Register Now (Complimentary Pass) 1. DDoS Attacks Against Telecom; Who Takes The Blame? Monday, March 21, 13:40 – 14:10 GST (Meeting Room) Francisco Z. Gaspar,Lead Cybersecurity, Telefónica, Germany Shaju Bhaskaran,Information Security Officer & Head of SOC… Read More »5 Sessions That You Can’t Miss @ GISEC Global 2022