Skip to content
CloudSEK
  • Products
    • XVigil
  • Solutions
    • Cyber Threats Monitor
      • Dark web Monitoring
    • Brand Monitor
    • Infrastructure Monitor
  • Customers
    • Customer Stories
  • Resources
    • Blog
    • Opinions
    • Threat Intelligence
    • Webinars
    • Whitepapers, Reports & Guides
    • Cyber Bulletin
  • About Us
    • Our Story
    • The Team
    • Careers
    • In the News
    • Announcement
  • Login
  • Request a Demo

Category: Vulnerability

A Guide to the Most Popular Zero-Day Attacks

Posted on January 28, 2021 | by Nikhil Anil | Leave a Comment on A Guide to the Most Popular Zero-Day Attacks

Zero-days are software vulnerabilities that are not known to the developers. Here’s a list of the most popular zero-day attacks.

Posted in Hacking, RCE, Security, Spear phishing, Vulnerability, Zero-day | Tagged Opinions

Contemporary Single-Page Applications and Frontend Security

Posted on October 28, 2020 | by Palash

This blog details the build process of Single-Page Applications, and explains how they alter the security implications in the frontend.

Posted in Engineering, Security, Vulnerability | Tagged Research

Why programming skills are essential for penetration testers

Posted on September 22, 2020 | by Shashank Barthwal | Leave a Comment on Why programming skills are essential for penetration testers

Experienced security professionals say that entry-level positions in security and hacking doesn’t require programming skills. Is this true?

Posted in Programming, Security, Vulnerability | Tagged Opinions

What makes web applications an easy target for hackers?

Posted on September 16, 2020 | by Utkarsh Agarwal | Leave a Comment on What makes web applications an easy target for hackers?

Verizon Data Breach Investigation Report finds that web applications are the single most significant cause for data breaches. Learn why.

Posted in Security, Vulnerability | Tagged Opinions

Why monitoring the most popular P2P messenger should be a cybersecurity priority

Posted on August 18, 2020 | by Prerit Prasad | Leave a Comment on Why monitoring the most popular P2P messenger should be a cybersecurity priority

The anonymity associated with Telegram increases the odds of misusing its features. Monitor activities on it regularly to fend off threats.

Posted in Security, Vulnerability | Tagged Opinions

What makes Android apps vulnerable to cyberattacks?

Posted on July 30, 2020 | by Palash | Leave a Comment on What makes Android apps vulnerable to cyberattacks?

In 2018, high risk vulnerabilities were found in 43% Android apps. These are the security flaws that users and developers commonly encounter.

Posted in Security, Vulnerability

Quickstart Shodan: What is it and how does it work

Posted on July 15, 2020 | by Sparsh Kulshrestha | Leave a Comment on Quickstart Shodan: What is it and how does it work

Security professionals, government agencies trust Shodan to alert them on unmanaged IoT devices. Learn more about Shodan and its working.

Posted in Engineering, Vulnerability

GraphQL 101: Here’s everything you need to know about GraphQL (Part 2)

Posted on June 17, 2020 | by Vishal Singh | Leave a Comment on GraphQL 101: Here’s everything you need to know about GraphQL (Part 2)

Although GraphQL is one of the most efficient alternatives to REST API, it is vulnerable to attacks. Here, we discuss common GraphQL flaws.

Posted in Engineering, Vulnerability

Pen-testing IoT Devices for Vulnerabilities

Posted on April 14, 2020 | by Palash | Leave a Comment on Pen-testing IoT Devices for Vulnerabilities

Although the security of IoT devices demands immediate attention, the abundance of these devices has resulted in the lack thereof.

Posted in Security, Vulnerability | Tagged Opinions
  • Recent
  • Comments

Categories

  • Achievements
  • Advisory
  • Adware
  • APT
  • Artificial Intelligence
  • Awards
  • Banking Trojan
  • Botnet
  • Brand Monitoring
  • Breach
  • Career
  • Cloud
  • Cloud services
  • COVID
  • Cryptomining
  • Cybersecurity
  • Dark Web
  • Data leaks
  • DDoS
  • Digital assets
  • Engineering
  • Espionage
  • Events
  • Hacking
  • Hiring
  • Infrastructure Engineering
  • Integration
  • Local Privilege Escalation
  • Machine Learning
  • Malware
  • Phishing
  • Product Management
  • Programming
  • RaaS
  • Ransomware
  • RAT
  • RCE
  • Scam
  • Security
  • Smishing
  • Social Engineering
  • Spear phishing
  • Threat Intelligence
  • Trojan
  • UI/UX
  • Vulnerability
  • Zero-day

CloudSEK - Logo for dark backgrounds
Products
  • XVigil
Solutions
  • Cyber Threats Monitor
  • Brand Monitor
  • Infrastructure Monitor
About Us
  • The Team
  • In the news
  • Announcement
  • Customer Stories
  • Privacy
  • Security
  • GDPR
Careers
  • Careers
  • Jobs
  • Life at CloudSEK
Resources
  • Blogs
  • Opinions
  • Webinars
  • Whitepapers, Reports & Guides
  • Threat Intelligence
  • Cyber Bulletin
Events
  • Media Kit

Copyright © 2020 CloudSEK