Learn the fundamentals of OT security, ICS, and CPS with real-world examples, risk insights, and beginner-friendly cybersecurity concepts explained clearly| Payatu
In 2024, 60% of cloud data breaches were caused by incorrect settings, which cost firms an average of $4.9 million per time (IBM Cost of a Data Breach Report, 2024. How can businesses make sure they have strong security and consumer trust as they move to the cloud? The key to keeping data safe in […]| Payatu
Introduction NoSQL databases have transformed how modern applications handle large volumes of data. From social platforms to e-commerce backends, tools like MongoDB and CouchDB offer the flexibility and speed developers crave. But with that freedom comes a quiet, often underestimated threat: NoSQL injection. NoSQL injection is similar to the better-known SQL injection, but instead of […]| Payatu
What IT & OT leaders must know about the NCIIPC Conformity Assessment Framework to safeguard India’s Critical Infrastructure. Prepare for CAF in 2025.| Payatu
The term ‘security posture’ is all about the current state of security and can be categorized productively as CSPM. Cloud security posture management (CSPM) identifies and remediates risk by automating visibility, uninterrupted monitoring, threat detection, and remediation workflows to search for misconfigurations across diverse cloud environments/infrastructure, including: • Infrastructure as a Service (IaaS): A computational […]| Payatu
Introduction As India’s power sector becomes increasingly dependent on digital technologies and faces a sharp rise in cyber threats, the Central Electricity Authority (CEA) has released the Draft CEA Cyber Security Regulations, 2024. It is a critical step in strengthening India’s critical power infrastructure. The draft is subject to consultation with various stakeholders, and the final rules […]| Payatu
Introduction Automation significantly enhances the efficiency and productivity of our work. It spares the human effort involved in doing a repetitive task manually. By writing a script, we can delegate our work to the computer’s processor, which is better suited to handle such repetitive tasks. There are already many extensions available online to automate different […]| Payatu
Defence is important for staying safe from cyber-attacks, but how do you make sure the defence is equipped enough to stop a full-fledged attack from a real threat actor? A Red Team’s action challenges an organisation’s security posture. The way the Red Team and Blue Team work to defend their organisation might be different, […]| Payatu
After understanding the Hermes bytecode and bypassing SSL certificate pinning, it’s now time for the final blog of the React Native Pentesting for Android Masterclass! React Native provides a set of built-in Core Components and APIs ready to use in the app. While we are not limited to these built-in packages, React Native has a community of […]| Payatu
In the last blog of the React Native Pentesting for Android Masterclass, we covered understanding the Hermes bytecode. Let’s move forward! What is SSL certificate pinning? You might already be aware of SSL certificate pinning in the Android application. In short, SSL certificate pinning is a process of associating a host with its expected X509 […]| Payatu
In this post, we'll discuss a technique you can employ to read data from an eMMC chip and proceed with further analysis. The eMMC chip featured in this blog post is sourced from an EV scooter.| Payatu