Blog

Showing 1 to 10 of 11 posts.

Domain Name System (DNS) infrastructure hijacking is where an attacker using the compromised credentials, modifies the DNS records like Name Server (NS), Mail Exchanger (MX), Address (A), and replaces the legitimate address with the address that attacker has control.

protect nginx server identity

Posted in #nginx January 8th, 2019 By admin

NGINX web server's default configuration allows to return the type and version that it is running...

Cross Site Scripting attack and prevention

Posted in #security , #xss December 26th, 2018 By admin

Cross-Site Scripting ( abbreviated as XSS) attack is the most common application level attack technique in which malicious scripts are injected into web pages...

OS Fingerprinting

Posted in #attack-patterns December 24th, 2018 By admin

An adversary engages in fingerprinting activities to determine the type or version of the operating system of the remote target...

How to control outbound DNS Access

Posted in #security December 18th, 2018 By admin

User workstations, tablets and phone may be configured to send DNS requests to servers other than the authorized DNS caching name servers (also called resolving, forwarding or recursive name servers)...

How to prevent Ransomeware attack

Posted in #security December 4th, 2018 By admin

Ransomware are the computer viruses that prevents you from using your computer unless you do something. Most common ransomware ask you to pay ransom (usually a fee or other makes you perform surveys) to get access to your computer...

Improving Website Security by Avoiding Mixed Content

Posted in #security November 19th, 2018 By admin

Mixed-Content pages are the web pages that are transmitted over secure HTTPS connection but include resources like JavaScript files, images, css files, fonts etc...

PCI DSS High Level Requirements

Posted in #pci , #security November 5th, 2018 By admin

The goal of the Payment Card Industry Data Security Standard (PCI DSS) is to protect cardholder's data...

Technical support scams starts with scammers claiming to be associated with companies offering legitimate support services...

Security checklist for system administrators

Posted in #security October 15th, 2018 By admin

Security checklist for system administrators...