Skip to content

others

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass Secures USPTO Patent for Automated Red Teaming

FireCompass has recently secured a patent from the United States Patent and Trademark Office (USPTO) for their innovative approach to Automated Red Teaming in Organizational Networks. This milestone is set to reshape the landscape of cybersecurity, particularly in the realms of Automated Pen testing and Red Teaming. The minds behind this revolutionary technology are Arnab… Read More »FireCompass Secures USPTO Patent for Automated Red Teaming

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

In a recent panel discussion on the “Ransomware Case Study,” cybersecurity expert Bikash Barai shared compelling insights into his advisory experience, shedding light on his active involvement in negotiating ransomware with hackers and threat actors. This discussion, featuring Bikash Barai (Co-Founder, FireCompass), Kinshuk De (Head Incident Response, TCS), Venkat Ramshet (Founder, Flexible IR) and Ashwani Paliwal (Founder, SecOps),… Read More »Ransomware Case Study, Negotiating with Hackers: Unconventional Tactics

Exploring API Subdomains

What are API Subdomains? Subdomains of a website or web application that are reserved especially for hosting APIs (Application Programming Interfaces) are known as API subdomains. These subdomains are used to provide access to various functionalities and data through standardized interfaces, allowing developers to interact with the system programmatically. A Simple Example Suppose you have… Read More »Exploring API Subdomains

Adopting Generative AI In Cyber security

Adopting Generative AI In Cyber Security

In recent years, generative AI has gained significant attention across industries. While it has shown amazing results in applications like image generation, text synthesis, media generation, transformation of content between different media etc, the field of cybersecurity has recently started warming up to the idea of using Generative AI. The question is: Where in cyber… Read More »Adopting Generative AI In Cyber Security

FC Attacking Modern Web Applications

Attacking Modern Web Applications

In the realm of contemporary of Modern web applications, the prevalent architectural framework of choice often takes the form of microservices architecture. In this context, what appears to be a unified front-end application is essentially an amalgamation of numerous small, distinct micro-services on the back end, interconnected through a reverse proxy mechanism. Consider, for instance,… Read More »Attacking Modern Web Applications