As cybersecurity professionals, we encounter many cybersecurity issues, vulnerabilities, and trending threats on a daily basis. In an effort to share this knowledge with those who may find it helpful, we frequently post blogs on these topics. Our goal is to provide valuable information to those who are searching for it.
Table Of Contents Background Analysis MITRE ATT&CK TTP Further Findings Indicator of Compromise (IoC) Recommendations Background In the recent month, there is misinformation circulating concerning leaks of private video of Nepali female celebrities.Read More
Table Of Contents Foreword Contents Cryptography Basics Hashing Encryption Digital Signature Cryptography in Ethereum Elliptic Curve Cryptography Overview Point Addition Scalar Multiplication Key generation Signatures in Ethereum ECRECOVER Overview Security Risk Mitigation Measure References Foreword This is third in a series of articles on vulnerabilities that smart contracts are susceptible to.Read More
Table Of Contents Foreword Contents Re-entrancy Overview Security Risk Example Identification techniques Mitigation measures References Foreword This is second in a series of articles on vulnerabilities that smart contracts are susceptible to.Read More
Table Of Contents Foreword Table of Contents Transaction Order Dependence Overview Introduction Ethereum mempool Security Risk Example Identification Techniques Mitigation Measures References Foreword This work is first in the series of articles on vulnerabilities that smart contracts are susceptible to.Read More
Although it sounds silly, I am dumb enough to do this.Read More
Table Of Contents ISO 27001 Introduction About ISMS Needs of ISMS How ISO 27001 work?Read More
Table Of Contents Local SWIFT Infrastructure Operators Operators PCs Data Exchange Layer Middleware Server Architecture Assessment Approaches Approach - I Approach - II What should a tester look for while using this approach?Read More