Research & Technology

search
post blog image

Empowering Cybersecurity Teams with Cyber Range...

In our last blog, we learned about different cyber range teams and their preparedness. This knowledge would help us to plan the teams required for a Cyber Range with clear-cut roles and...

+ Read More
post blog image

APIFUZZER™: Enhancing RESTful API Security...

According to The Hacker News, since January 2022, there has been a notable rise in threat actors utilizing Microsoft Graph API for malicious purposes, aiming to circumvent detection. Several...

+ Read More
post blog image

Elevating Cyber DefenSe: The Integral Role of...

In our modern era of rapid digital transformation, traditional approaches to cybersecurity are no longer adequate. With the proliferation of digital technologies and the increasing sophistication of...

+ Read More
post blog image

Brute Force & Vulnerable APIs: How Dell-like...

Recently, Dell faced a major data breach, compromising the personal information of around 49 million customers. Initially reported by Daily Dark Web, threat actor Menelik orchestrated the breach and...

+ Read More
post blog image

Fuzz Testing for APIs: Strengthening Security in...

Present day applications rely heavily on APIs (Application Programming Interfaces) as they are essential in modern web applications. APIs facilitate communication between different software systems....

+ Read More
post blog image

Navigating the Cybersecurity Skills Shortage:...

In the current fast-changing cybersecurity environment, the urgency of effective security measures has never been more pronounced. With increasing cyber threats and attacks targeting organizations of...

+ Read More