Skip to content
Corporate Blog

Corporate Blog

Opinions on Penetration Testing, Web-Application Security, Network Security, Mobile Security & Everything In Between

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
Search
  • Home
  • Security Attacks
    • Cross-Site Request Forgery
    • Cross-Site Scripting
    • KRACK
    • SQL Injection
  • Databases
    • MSSQL
    • MySQL
    • Oracle
  • Recommendations
    • Data Breaches
    • Input Validation
    • Insecure Cryptographic Storage
    • Phishing Attacks
    • Redirect Abuse
  • Wireless
    • MAC Address Filtering
    • SSID
    • WPA
    • WPA2
data-breach

Data Breach : 5 Security Misconceptions

Posted on February 4, 2019July 12, 2019 by Jamila Pittalwala

2018 has seen some of the most expensive data-breaches. A giant organisation like Facebook was affected by a massive breach

Continue Reading
Data Breaches, Recommendations
Leave a comment
sports-day-1

Sports Day: Back To School

Posted on September 26, 2018July 12, 2019 by Jamila Pittalwala

Sports Day: A Biannual Event On an overcast morning, the Security Brigade Employees prepare for their Biannual Sports Day. They

Continue Reading
Office Events
Leave a comment
Red Team Security Brigade.

Red Team: How We Compromised A Banks’ Network

Posted on September 22, 2018July 12, 2019 by Yogesh Prasad

A Red Team activity helps an organization assess it’s security posture, and it’s ability to safeguard assets against a persistent

Continue Reading
Red Team
One comment
google play store trojan

Weekly Cyber Security News: 3rd September 2018

Posted on September 3, 2018September 4, 2018 by Jamila Pittalwala

This post is your weekly cyber security news update for the 3rd of September 2018. This post is part of the

Continue Reading
Weekly Cyber Security News
Leave a comment
IBM AS/400 System

Security Audit of IBM AS/400 and System i : Part 2

Posted on August 22, 2018July 12, 2019 by Yogesh Prasad

Security Audit of IBM’s AS/400 System i: Part 2 Process Segregation for AS/400 security audit This post is a continuation

Continue Reading
IBM AS/400, Security Audit
Leave a comment
IBM AS/400 System

Security Audit of IBM AS/400 and System i : Part 1

Posted on August 21, 2018July 12, 2019 by Yogesh Prasad

Security Audit of IBM’s AS/400 System i: Part 1 In this blog post, we will be describing our experience of

Continue Reading
IBM AS/400, Security Audit
One comment
Top Clicked Phishing Links

Weekly Cyber Security Update: 17th August 2018

Posted on August 17, 2018September 4, 2018 by Jamila Pittalwala

This post is a weekly cyber security update for the 17th of August 2018. This post is part of the weekly news

Continue Reading
Weekly Cyber Security News
Leave a comment
Pizza As A Service 1.0 Cloud Deployment

Weekly Cyber Security News: 10th August 2018

Posted on August 10, 2018September 4, 2018 by Jamila Pittalwala

This is a weekly cyber security news update for the 10th of August 2018. This post is part of the

Continue Reading
Weekly Cyber Security News
Leave a comment
HTTPS VS HTTP

Weekly Cyber Security News: 1st August 2018

Posted on August 1, 2018September 4, 2018 by Jamila Pittalwala

This post is a weekly cyber security news update for the 1st of August 2018. This post is part of

Continue Reading
Weekly Cyber Security News
Leave a comment
Weekly Cyber Security News

Weekly Cyber Security News: 24th July 2018

Posted on July 24, 2018July 10, 2019 by Jamila Pittalwala

This is a weekly cyber security news update for the for the 24th of July 2018. This post is part

Continue Reading
Weekly Cyber Security News
Leave a comment

Posts navigation

1 2 3 … 5 Next Posts»

Quick Links

  • Popular
  • Categories
  • Archives
  • Tags
  • Fixing Cross-site Scripting in Spring MVC
    May 1, 2012
  • 5 Steps to Avoid Phishing Scams in E-mail
    December 25, 2012
  • How to Secure Home Wireless Network
    May 26, 2011
  • Fixing Cross-site Scripting in Java
    May 1, 2012
  • Wireless Security: How to Disable SSID Broadcast
    May 27, 2011
  • .NET (5)
  • ASP (5)
  • Cross-Site Request Forgery (1)
  • Cross-Site Scripting (3)
  • Data Breaches (1)
  • Databases (9)
  • Frameworks (1)
  • IBM AS/400 (2)
  • Input Validation (14)
  • Insecure Cryptographic Storage (1)
  • Java (6)
  • JSP (2)
  • KRACK (1)
  • Languages (20)
  • MAC Address Filtering (1)
  • MSSQL (4)
  • MySQL (1)
  • Office Events (1)
  • Oracle (4)
  • Phishing Attacks (1)
  • PHP (6)
  • Recommendations (18)
  • Red Team (1)
  • Redirect Abuse (1)
  • Security Attacks (16)
  • Security Audit (2)
  • Spring MVC (1)
  • SQL Injection (11)
  • SSID (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
  • WPA (1)
  • WPA2 (1)
  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)
anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture

Recent Posts

  • data-breach Data Breach : 5 Security Misconceptions
    February 4, 2019
  • sports-day-1 Sports Day: Back To School
    September 26, 2018
  • Red Team Security Brigade. Red Team: How We Compromised A Banks’ Network
    September 22, 2018
  • google play store trojan Weekly Cyber Security News: 3rd September 2018
    September 3, 2018
  • IBM AS/400 System Security Audit of IBM AS/400 and System i : Part 2
    August 22, 2018

Categories

  • Databases (9)
    • MSSQL (4)
    • MySQL (1)
    • Oracle (4)
  • Frameworks (1)
    • Spring MVC (1)
  • Languages (20)
    • .NET (5)
    • ASP (5)
    • Java (6)
    • JSP (2)
    • PHP (6)
  • Office Events (1)
  • Recommendations (18)
    • Data Breaches (1)
    • Input Validation (14)
    • Insecure Cryptographic Storage (1)
    • Phishing Attacks (1)
    • Redirect Abuse (1)
  • Red Team (1)
  • Security Attacks (16)
    • Cross-Site Request Forgery (1)
    • Cross-Site Scripting (3)
    • KRACK (1)
    • SQL Injection (11)
  • Security Audit (2)
    • IBM AS/400 (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
    • MAC Address Filtering (1)
    • SSID (2)
    • WPA (1)
    • WPA2 (1)

About Security Brigade

Security Brigade a CERT-In empanelled founded on the core belief that "Great audits are done by great auditors - not expensive tools". Our proprietary E.D.I.T.E platform provides a workflow based testing engine that encapsulates the complete audit process. It allows expert auditors to focus on in-depth manual testing while assisted by a combination of proprietary, open-source and commercial technology.
Read More about SB

Archives

  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)

Social Icons

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram

Tag Cloud

anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture
Made with ❤ at Security Brigade © 2020 All rights reserved.