Skip to content

Priyanka Aash

Analysing/Dissecting Uber Subdomain Takeover Attack – FireCompass

Subdomain Takeover is a type of vulnerability which appears when a DNS entry (subdomain) of an organization points to an External Service (ex. Heroku, Github, Bitbucket, Desk, Squarespace, Shopify, etc) but the service is no longer utilized or has been migrated/deleted. In this blog, we will be dissecting Uber Subdomain takeover vulnerability… Read More »Analysing/Dissecting Uber Subdomain Takeover Attack – FireCompass

Shadow IT Threats – How To Turn Them Into Opportunity?

Shadow IT  threats involves pushing back on any initiatives that try to bypass IT and fighting the line of business managers for ownership of these projects. Shadow IT opportunity involves transforming shadow IT into official line-of-business shortcuts and becoming the corporate champion of innovative initiatives. Below are a few ways one could looks… Read More »Shadow IT Threats – How To Turn Them Into Opportunity?

3 Social Engineering Attacks To Look Out For

Social Engineering attacks refers to psychological manipulation of people into making security mistakes or giving away sensitive information. Most common social engineering attacks used to target users are Phishing Attack: These attacks are the most common type of attacks leveraging social engineering techniques. Attackers use social media, emails, instant messaging… Read More »3 Social Engineering Attacks To Look Out For