Blogs

As cybersecurity professionals, we encounter many cybersecurity issues, vulnerabilities, and trending threats on a daily basis. In an effort to share this knowledge with those who may find it helpful, we frequently post blogs on these topics. Our goal is to provide valuable information to those who are searching for it.

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide
Aaditya Khati
January 1, 2023

MSSPAlert lists CryptoGen Nepal for Top 250 MSSP Worldwide

Table Of Contents Introduction About us About CyberRisk Alliance Introduction CryptoGen Nepal is listed as Top 250 MSSP.

Read More
leveraging the SQL Injection to Execute the XSS by Evading CSP
Nirmal Dahal
July 12, 2022

leveraging the SQL Injection to Execute the XSS by Evading CSP

Although it sounds silly, I am dumb enough to do this.

Read More
International standard for information security (ISO) - 27001
Yojan Dhakal
April 17, 2022

International standard for information security (ISO) - 27001

Table Of Contents ISO 27001 Introduction About ISMS Needs of ISMS How ISO 27001 work?

Read More
A Pentester's Prespective: SWIFT Vulnerability Assessment
Niraj Kharel
April 8, 2022

A Pentester's Prespective: SWIFT Vulnerability Assessment

Table Of Contents Local SWIFT Infrastructure Operators Operators PCs Data Exchange Layer Middleware Server Architecture Assessment Approaches Approach - I Approach - II What should a tester look for while using this approach?

Read More
SWIFT CSP v2022 assessment
Yojan Dhakal
April 5, 2022

SWIFT CSP v2022 assessment

Table Of Contents SWIFT CSP v2022 assessment Why Is It Required?

Read More
XSS on Samy Pl
Nirmal Dahal
June 19, 2019

XSS on Samy Pl

In this article, I am going to explain a security issue that I found on a web site which is famous within the information security researchers.

Read More
CVE-2021-3258 | S-XSS to Defacement & Account Takeover [Q2A Themes]
Nirmal Dahal
August 21, 2017

CVE-2021-3258 | S-XSS to Defacement & Account Takeover [Q2A Themes]

In this article, I am going to share a POC (Proof of Concept) on a vulnerability that I found on a popular Forum Management System by Q2A.

Read More