Business Impact Of COSMOS Bank Breach

Business Impact Of COSMOS Bank Breach

Recently, you might have heard in news about COSMOS Bank Breach, a 112-year old cooperative bank in India and the second largest in the country being hacked and crores were siphoned off. COSMOS Bank has faced monetary  losses because of recently happened COSMOS Bank hack. And also they might have to face non-monetary losses like any otherRead more about Business Impact Of COSMOS Bank Breach[…]

2 Ways to Identify & Prevent Subdomain Takeover Vulnerability

2 Ways to Identify & Prevent Subdomain Takeover Vulnerability

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized. In this article, we have identified top 2 ways to identify and prevent subdomain takeover risk. Subdomain Takeover (Simple Definition):Read more about 2 Ways to Identify & Prevent Subdomain Takeover Vulnerability[…]

Top Open Source Tools to detect Subdomain takeover risk

Top Open Source Tools to detect Subdomain takeover risk

Subdomain Takeover is a type of risk which exists when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized (deleted or migrated). We have complied a list of Top Open Source Tools to detect Subdomain takeover risk. A well-knownRead more about Top Open Source Tools to detect Subdomain takeover risk[…]

Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov

One of the major pain point for large enterprises is not knowing their digital infrastructure completely. Hackers are constantly looking for these soft targets. Subdomain Takeover is a type of vulnerability which occurs when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Amazon, Bitbucket, Desk, Squarespace, Shopify, etc) but theRead more about Top 6 Subdomain Takeover attacks on Uber, Lamborghini, USA.gov[…]

Analysing/Dissecting Uber Subdomain Takeover Attack

Analysing/Dissecting Uber Subdomain Takeover Attack

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability which was further escalated toRead more about Analysing/Dissecting Uber Subdomain Takeover Attack[…]

Top 8 Ways To Handle Leaked Credentials Incidents

Top 8 Ways To Handle Leaked Credentials Incidents

The Deep Web contains nearly 550 billion individual documents. Search engines can only access 16% of the available information, this gives you an idea of the huge size of dark web. There is about 5+ Billion Leaked Credentials, Credit Card Breaches information available on dark web. In this blog, we will talk about Top 8 ways toRead more about Top 8 Ways To Handle Leaked Credentials Incidents[…]

4 Steps To Secure Enterprise Digital Footprints

4 Steps To Secure Enterprise Digital Footprints

As previously we talked briefly about digital footprint and how to manage it in our blog 4 Ways To Manage Enterprise Digital Footprint. Here we will talk in details about how to Secure Enterprise digital footprints. An Enterprise Digital Footprint is an inventory of all the digital assets over internet (web, mobile, individual, social etc) related to an enterpriseRead more about 4 Steps To Secure Enterprise Digital Footprints[…]

Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?

Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?

How does Your Current CyberSecurity Posture looks like ? Where does your security strategy stand? What are your biggest risks? Where should you focus your efforts? Where do you stand with respect to your peers ? Why CyberSecurity Maturity Assessment ? Majority of the answers for above questions for an organisation lies in its Cyber SecurityRead more about Top 5 Benefits: Why Organisation Must Do CyberSecurity Maturity Assessment ?[…]

Information Security Metrics and Dashboard for the CEO / Board

Information Security Metrics and Dashboard for the CEO / Board

It is very important to properly define the right Information Security Metrics for an organization to estimate the security structure and to communicate it efficiently to the Board level executives.There is a growing interest from the Board and the CEO to understand the information security posture of the company. Many of the CISOs I knowRead more about Information Security Metrics and Dashboard for the CEO / Board[…]