How to put a hold on hacks by fighting against cyber threats? A cyber threat is a malicious act that attempts to steal data and damage data. Cyber threats include malware, phishing attacks, ransomware, zero-day exploits, data breaches, denial of service (DoS) attacks, computer viruses, and other attack vectors. Cyber threats are also referred to […]
Category: Featured Topics
Why Risk Analysis is Important for a Business? Running a business entails numerous risks. Some of these potential risks have the potential to destroy a business, while others can cause serious damage that is both costly and time-consuming to repair. Regardless of the risks inherent in doing business, the concerned in-charge can anticipate and plan […]
Why Is Stress Testing So Valuable? Non-functional testing can take many different forms and examines elements of software other than its functionality, such as its usability, performance, and stability. Computer hardware should generally undergo exaggerated amounts of stress during stress testing to ensure stability when used in a typical context. Extremes in workload, job type, […]
Ways to Improve Existing Incident Response Plan Introduction Incident Response Plan (IRP) is a set of documented guidelines for identifying, responding to, and minimizing the effects of an information security event. A variety of potential scenarios, such as data breaches, distributed denial of service attacks, firewall breaches, virus or malware outbreaks, or insider threats are […]
CVE-2022-20969: Cisco Umbrella –Cloud Stored cross-site scripting Vulnerability Description On June 02, the security team of Green Tick Nepal Pvt. Ltd. one of the leading cyber security service providers located in Kathmandu, Nepal discovered an Un-sanitized input in multiple management dashboard pages of Cisco Umbrella –Cloud that leads to Stored cross-site scripting. Proof of Concept […]
Cyber Threats Outbreak: Prevention, Protection, and Recovery Cyber threats refer to the potential for a successful cyber-attack with the intent of stealing sensitive data, damaging or disrupting a computer network, or gaining unauthorized access to an information technology asset. A cyberattack is a malicious and intentional attempt by an individual or a company to compromise […]
Importance of Data Center Importance of data center: As the world is moving towards cloud technology, we hear the term “data center” a lot. Every leading tech company needs the support of data centers. In the context of modern-day technology, it is safe to say that it would be impossible for a tech firm to […]
What is the CIA triad? When anyone mentions the CIA, we have an image generated impulsively of a spy who might be a member of a government body typically known as the Central Intelligence Agency (CIA), and they might have a mission to hack into some criminal’s life and get them to the house […]
CVE-2022-37245: Stored Cross Site Scripting (XSS) at ‘Blacklist’ endpoint Description On June 05, the security team of Green Tick Nepal Pvt. Ltd. located in Kathmandu, Nepal discovered that MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to Cross Site Scripting (XSS) via the Blacklist endpoint. The software does not neutralize or incorrectly neutralizes user-controllable […]
CVE-2022-37244: IFRAME Injection at ‘currentRequest’ Parameter Description On June 05, the security team of Green Tick Nepal Pvt. Ltd. located in Kathmandu, Nepal discovered that MDaemon Technologies SecurityGateway for Email Servers 8.5.2 is vulnerable to IFRAME Injection via the currentRequest parameter, after login leads to inject malicious tag leads to IFRAME injection. Proof of […]