Skip to content

Blog

Importance of GitHub Reconnaissance in CASM & CART

GitHub reconnaissance is an important aspect of attack surface management, particularly for organizations and individuals who rely heavily on software development and open-source code. Here’s why it is crucial: Discovery of Sensitive Information Developers sometimes inadvertently push sensitive information e.g. hardcoded credentials, API keys, access tokens and Configuration Files containing sensitive information Identification of Security… Read More »Importance of GitHub Reconnaissance in CASM & CART

Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

In the ever-evolving landscape of digital connectivity and technology, organizations face an incessant challenge to fortify their cyber defenses against an ever-expanding array of threats. The rapid advancement of information technology has brought about unparalleled convenience and efficiency, but it has also ushered in an era where the vulnerability of digital ecosystems is a constant… Read More »Unveiling the Veil: A Case Study on Recent Critical Vulnerabilities

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains

Google Dorking for Continuous Attack Surface Management

Google Dorking, also known as Google hacking, is a technique where advanced search operators are used to find specific information on search engines. It involves crafting search queries to discover vulnerable or exposed data on the internet. Attack surface management involves identifying and securing all possible entry points into an organization’s systems and networks. It… Read More »Google Dorking for Continuous Attack Surface Management