Tag: Research

Read our latest blog posts

Contemporary Single-Page Applications and Frontend Security

This blog details the build process of Single-Page Applications, and explains how they alter the security implications...

Continue reading

Development of a Language-Independent Microservice Architecture

In this blog we discuss how to create a language-independent microservice using Google's open source RPC and...

Continue reading

How does CloudSEK’s XVigil detect rogue, fake applications

XVigil reported over 2.4L fake apps on popular app stores, infringing on its clients copyrighted materials. How...

Continue reading

How to build a secure AWS infrastructure

Summary of the recommendations of AWS' Well-Architected Framework, with respect to design, delivery, and maintenance of secure...

Continue reading

How are Python modules used for web crawling?

The significance of web crawling and how to fetch downloadable URLs from YouTube using Python modules, to...

Continue reading

How do you achieve concurrency with Python threads?

Implementing concurrency, without decelerating a program, is an ongoing concern. So, how do you achieve this using...

Continue reading

Why attackers can’t resist Android applications

Why do attackers often target Android apps? What makes them easy targets? How do attackers exploit their...

Continue reading

How do threat actors discover and exploit vulnerabilities in the wild?

Attackers use a variety of tools and techniques to discover and exploit security vulnerabilities in widely used...

Continue reading

Employing Typography to Improve Content Engagement

Typography plays a significant role in the process of writing textual content. The aesthetic of the text...

Continue reading

Popular payment gateway provider flaw: Transactions with same OTP

Investigation of a flaw in the logical design, of a previous version of Wibmo payment gateway, allowed...

Continue reading