Supply Chain Management System of Agriculture in Nepal
Supply Chain Management System of Agriculture in Nepal 66 percent of its people work in the sector of agriculture in Nepal directly. About 30% of Nepal’s land is used for agricultural purposes. Though the economic structure of Nepal has shifted from agriculture to service and industry over the past few decades, agriculture in Nepal...
Cyber Security Monitoring (CSM): Implementation and Challenges
Cyber Security Monitoring (CSM): Implementation and Challenges The process of continuously watching an IT system for data breaches, cyber threats, or other system weaknesses is known as “cyber security monitoring.” It is a preventative cyber security technique that can assist an organization in sorting through online activity to...
CVE-2022-35168 (Denial of Service vulnerability in SAP Business one Version – 10.0 product of SAP SE)
CVE-2022-35168 (Denial of Service vulnerability in SAP Business one Version – 10.0 product of SAP SE) Description The security team of Green Tick Nepal Pvt. Ltd. located in Kathmandu, Nepal discovered a Denial of Service vulnerability in SAP Business one Version – 10.0 product of SAP SE. Due to improper input sanitization of XML...
Bringing AI to Internet of Things
Bringing AI to the Internet of things: Artificial intelligence refers to a computer or a robot controlled by a computer’s capacity to carry out tasks that are typically performed by humans since they call for human intelligence and judgment. Likewise, the “Internet of things” (IoT) is a term used to describe physical objects...
Digital Transformation: Its Impact on Business Landscape
Digital Transformation: Its Impact on Business Landscape Digital transformation is the process of embedding technologies into all aspects of business, from daily operations, and accounting to strategic decision-making. It is not only about converting analog to digital technologies but also about a culture shift and rethinking of ways an...
Age Without Cash: Digital Payments and its Safety Measures
Age without Cash: Digital Payments and its Safety Measures When it comes to making payments, people now have various options to choose from. While some people prefer the digital payment over traditional cash payment systems. Both approaches offer their own advantages and as a consumer knowing how they function can help you avoid taking...
Top 5 Emerging Issues in Nepal
Emerging Issues in Nepal emerging issues in Nepal, there are innumerable issues that citizens are facing in their daily lives. These issues have been raised as very important by the scientific community but are yet to garner acceptable attention from the policy position community. The top 5 emerging issues in Nepal that have been arising...
CVE-2022-32389-Swift XMPP Client Desktop 4.0.2 has a Hard-coded Password affecting various sectors (Military, Finance and Government)
CVE-2022-32389-Swift XMPP Client Desktop 4.0.2 has a Hard-coded Password affecting various sectors (Military, Finance and Government) Description On June 1st, Our Green Tick security team was taking a snap-shot of the registry before and after installation in order to see what changes were being made in the registry and our team discovered...
CVE-2022-29728 | Survey Sparrow Enterprise Survey Software | Reflected cross-site scripting (XSS) vulnerability 2022
CVE-2022-29728 | Survey Sparrow Enterprise Survey Software | Stored cross-site scripting (XSS) vulnerability 2022 Description On May 11, Survey Sparrow Enterprise Survey Software 2022 has a Reflected cross-site scripting (XSS) vulnerability in the test parameter which was discovered by the security team of Green Tick Nepal Pvt. Ltd. located in...
CVE-2022-29727 | Survey Sparrow Enterprise Survey Software | Stored cross-site scripting (XSS) vulnerability 2022
CVE-2022-29727 | Survey Sparrow Enterprise Survey Software | Stored cross-site scripting (XSS) vulnerability 2022 Description On May 11, Survey Sparrow Enterprise Survey Software 2022 has a Stored cross-site scripting (XSS) vulnerability in the Signup parameter which was discovered by the security team of Green Tick Nepal Pvt...
CVE-2022-29975 | CVE-2022-29976 | Alt-N MDaemon upto 20.0.0 Cross Site Scripting (XSS)
CVE-2022-29975 | CVE-2022-29976 | Alt-N MDaemon upto 20.00 Cross-Site Scripting (XSS) Description On May 11, An Authenticated Reflected Cross-site scripting at CC and BCC Parameters was discovered in MDaemon before 22.0.0 by the security team of Green Tick Nepal Pvt. Ltd. Located in Kathmandu, Nepal. Proof of Concept ...
How to be safe from violating Intellectual property
How to be safe from violating Intellectual property? Before knowing about Intellectual Property Rights, Intellectual properties are basically the creation of human minds. They are the category of intangible assets possessed and legally protected by a company or individual from unauthorized use or implementation without permission. It is...