Last week a Remote Code Execution vulnerability was disclosed in Spring. Spring is an open-source application framework that provides infrastructure support for creating Java applications that can be deployed on

Read More »

Penetration Testing Anecdote Series

Authentication bypass due to weak verification of SAML Token What is authentication bypass in web applications? The web application vulnerability – authentication bypass occurs when there is improper validation of

Read More »

Pre-Placement & hiring in times of Covid

Accorian at UPES, Dehradun Despite industry-wide hiring freezes as a result of COVID, Accorian has established its first university recruitment channel with UPES Dehradun for their security graduates; having hired

Read More »

Securing your O365

E-mails are the most used productivity tool by employees. They are also a treasure trove of information and are a lucrative target for hackers as all your data – company,

Read More »

Need Help?

I’m Here To Assist You

Something isn’t Clear? We would love to chat and discuss your security & technology challenges.

This website uses cookies to ensure you get the best experience on our website.