Skip to content
Corporate Blog

Corporate Blog

Opinions on Penetration Testing, Web-Application Security, Network Security, Mobile Security & Everything In Between

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
Search
  • Home
  • Security Attacks
    • Cross-Site Request Forgery
    • Cross-Site Scripting
    • KRACK
    • SQL Injection
  • Databases
    • MSSQL
    • MySQL
    • Oracle
  • Recommendations
    • Data Breaches
    • Input Validation
    • Insecure Cryptographic Storage
    • Phishing Attacks
    • Redirect Abuse
  • Wireless
    • MAC Address Filtering
    • SSID
    • WPA
    • WPA2
Spear Phishing

Weekly Cyber Security News: 17th July 2018

Posted on July 17, 2018July 12, 2019 by Jamila Pittalwala

This is a weekly news update for the 17th of July 2018. This post is part of the weekly news

Continue Reading
Weekly Cyber Security News
Leave a comment
ATM in India

Weekly Cyber Security News: 2nd July 2018

Posted on July 2, 2018July 3, 2018 by Jamila Pittalwala

This is weekly news update for the 2nd of July 2018. This post is part of the weekly news series

Continue Reading
Weekly Cyber Security News
Leave a comment
Krack Attack - WPA2

KRACK Attack: Breaking WPA2

Posted on October 17, 2017July 12, 2019 by Yogesh Prasad

The Krack Attack affects most wireless networks and clients across the world. Wireless networks play a crucial role in the digital

Continue Reading
KRACK, Security Attacks, Wireless, WPA2
Leave a comment

Fixing Unvalidated Redirects and Forwards in JAVA

Posted on March 22, 2014July 12, 2019 by Chintan

Note: This post is part of our series on “How to Fix Unvalidated Redirects and Forwards“. The series contains examples

Continue Reading
Java, Languages
One comment

Fixing Unvalidated Redirects and Forwards in PHP

Posted on March 22, 2014July 12, 2019 by Chintan

Note: This post is part of our series on “How to Fix Unvalidated Redirects and Forwards“. The series contains examples

Continue Reading
Languages, PHP
One comment

Fixing Cross-site Scripting in PHP

Posted on December 27, 2012July 12, 2019 by Chintan

Note: This post is part of our series on “How to Fix Cross-site Scripting Vulnerabilities“. The series contains examples on

Continue Reading
Cross-Site Scripting, Languages, PHP, Security Attacks
One comment

Fixing Insecure Cryptographic Storage in PHP

Posted on December 27, 2012July 12, 2019 by Chintan

Note: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on

Continue Reading
Languages, PHP
One comment

5 Steps to Avoid Phishing Scams in E-mail

Posted on December 25, 2012July 12, 2019 by Chintan

Anyone with an e-mail account, has at some point of time received phishing or scam e-mails. These range from Nigerian

Continue Reading
Phishing Attacks, Recommendations
3 comments

Fixing Unvalidated Redirects and Forwards in ASP.NET

Posted on May 2, 2012July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix Unvalidated Redirects and Forwards“. The series contains examples

Continue Reading
.NET, ASP, Languages
One comment

How to Fix Unvalidated Redirects and Forwards

Posted on May 2, 2012July 12, 2019 by Yash

An unvalidated redirect allows an attacker to exploit the trust a user has in a particular domain by using it

Continue Reading
Recommendations, Redirect Abuse
Leave a comment

Posts navigation

«Previous Posts 1 2 3 4 5 Next Posts»

Quick Links

  • Popular
  • Categories
  • Archives
  • Tags
  • Fixing Cross-site Scripting in Spring MVC
    May 1, 2012
  • 5 Steps to Avoid Phishing Scams in E-mail
    December 25, 2012
  • How to Secure Home Wireless Network
    May 26, 2011
  • Fixing Cross-site Scripting in Java
    May 1, 2012
  • Wireless Security: How to Disable SSID Broadcast
    May 27, 2011
  • .NET (5)
  • ASP (5)
  • Cross-Site Request Forgery (1)
  • Cross-Site Scripting (3)
  • Data Breaches (1)
  • Databases (9)
  • Frameworks (1)
  • IBM AS/400 (2)
  • Input Validation (14)
  • Insecure Cryptographic Storage (1)
  • Java (6)
  • JSP (2)
  • KRACK (1)
  • Languages (20)
  • MAC Address Filtering (1)
  • MSSQL (4)
  • MySQL (1)
  • Office Events (1)
  • Oracle (4)
  • Phishing Attacks (1)
  • PHP (6)
  • Recommendations (18)
  • Red Team (1)
  • Redirect Abuse (1)
  • Security Attacks (16)
  • Security Audit (2)
  • Spring MVC (1)
  • SQL Injection (11)
  • SSID (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
  • WPA (1)
  • WPA2 (1)
  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)
anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture

Recent Posts

  • data-breach Data Breach : 5 Security Misconceptions
    February 4, 2019
  • sports-day-1 Sports Day: Back To School
    September 26, 2018
  • Red Team Security Brigade. Red Team: How We Compromised A Banks’ Network
    September 22, 2018
  • google play store trojan Weekly Cyber Security News: 3rd September 2018
    September 3, 2018
  • IBM AS/400 System Security Audit of IBM AS/400 and System i : Part 2
    August 22, 2018

Categories

  • Databases (9)
    • MSSQL (4)
    • MySQL (1)
    • Oracle (4)
  • Frameworks (1)
    • Spring MVC (1)
  • Languages (20)
    • .NET (5)
    • ASP (5)
    • Java (6)
    • JSP (2)
    • PHP (6)
  • Office Events (1)
  • Recommendations (18)
    • Data Breaches (1)
    • Input Validation (14)
    • Insecure Cryptographic Storage (1)
    • Phishing Attacks (1)
    • Redirect Abuse (1)
  • Red Team (1)
  • Security Attacks (16)
    • Cross-Site Request Forgery (1)
    • Cross-Site Scripting (3)
    • KRACK (1)
    • SQL Injection (11)
  • Security Audit (2)
    • IBM AS/400 (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
    • MAC Address Filtering (1)
    • SSID (2)
    • WPA (1)
    • WPA2 (1)

About Security Brigade

Security Brigade a CERT-In empanelled founded on the core belief that "Great audits are done by great auditors - not expensive tools". Our proprietary E.D.I.T.E platform provides a workflow based testing engine that encapsulates the complete audit process. It allows expert auditors to focus on in-depth manual testing while assisted by a combination of proprietary, open-source and commercial technology.
Read More about SB

Archives

  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)

Social Icons

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram

Tag Cloud

anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture
Made with ❤ at Security Brigade © 2020 All rights reserved.