Research & Technology

post image

GUIDs Decoded: Safeguarding APIs from Cyberthreats

In API security, it is crucial to ensure that identifiers used within your system are not easily guessable. Instead of using predictable IDs, employing Globally Unique Identifiers (GUIDs) can signi...

+ Read More
post image

WazirX Security Breach: A Detailed Analysis of the $230 Million Crypto Heist

On July 18, 2024, WazirX, a prominent cryptocurrency exchange, fell victim to a significant cyberattack targeting one of their multisig wallets. This breach resulted in the theft of digital assets ...

+ Read More
post image

API Security in Action: Safeguarding EV Fleets & Charging Stations

India is poised to undergo a revolutionary shift in mobility through the introduction of Electric Vehicles as the Clean Energy Ministerial of India targets 30% sales of electric vehicles by 2030, o...

+ Read More
post image

Rising API Breaches & Criticality of API Security

As technology advances at an exponential pace, so does the sophistication of cyberattacks. To navigate this intricate domain effectively, it's crucial to stay informed about the latest data bre...

+ Read More
post image

Empowering Cybersecurity Teams with Cyber Range Toolset

In our last blog, we learned about different cyber range teams and their preparedness. This knowledge would help us to plan the teams required for a Cyber Range with clear-cut roles and responsibil...

+ Read More
post image

APIFUZZERâ„¢: Enhancing RESTful API Security Testing

According to The Hacker News, since January 2022, there has been a notable rise in threat actors utilizing Microsoft Graph API for malicious purposes, aiming to circumvent detection. Several nation...

+ Read More