Skip to content
Home
Origins
Services
Application Security
Web Application Penetration Testing
API Penetration Testing
Mobile Application Penetration Testing
Source Code Reviews
Threat Modeling
Architecture Reviews
Infrastructure Security
Internal Network Penetration Testing
External Network Penetration Testing
Active Directory Security Assessments
Wireless Network Penetration Testing
Host Reviews
Firewall Configuration Reviews
Cloud Security
Cloud Configuration Reviews
Cloud Penetration Testing
Adversary Simulations
Red Teaming
Purple teaming
OSINT
Phishing Simulations
DevSecOps
Container Security
Kubernetes configuration reviews
Other
Managed Vulnerability Scanning
PCI DSS Security Assessments
Hardware Security Assessments
Smart Contracts Security Assessments
MSOC
Academy
Advisory
Blog
Contact
Blog
Home
/ Blog
EXPLIoT: A Framework For Exploiting And Securing IoT Devices
Read More »
June 14, 2024
Flying Secure- A Comprehensive Guide to the Nabhyaan Drone
Read More »
June 14, 2024
Security Advisory – Multiple Vulnerabilities in LB-link BL-W1210M Router
Read More »
June 13, 2024
Domain Trusts: An Exploitation Playbook
Read More »
June 12, 2024
Car Hacking- The New Frontier In Cybersecurity
Read More »
June 10, 2024
Security Advisory – Multiple Vulnerabilities in Netgear WNR614 Router
Read More »
June 6, 2024
Analyzing Firmware and Extracting Filesystem
Read More »
June 4, 2024
Cybersecurity Strategies For Small And Mid-Sized Businesses (SMBs)
Read More »
June 2, 2024
Using Win32 API with Rust: A Step-by-Step Guide
Read More »
May 31, 2024
Digisol DG-GR1321: Plaintext Password Storage Vulnerability (CVE-2024-4232)
Read More »
May 24, 2024
Digisol DG GR1321’s Improper Access Control CVE-2024-4231
Read More »
May 24, 2024
Digisol DG-GR1321 Password Policy Bypass Vulnerability (CVE-2024-2257)
Read More »
May 22, 2024