Information Security Monthly Newsletter – Sep 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We have tried to keep you…

Information Security Monthly Newsletter – Aug 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We have tried to keep you…

Best Practices for Securing Crypto Currency exchange

In our last blog on crypto we discussed on a case study related to penetration testing of crypto exchange. Today we are going to discuss on best security practices for securing crypto exchange sites. Web Application Level 1) Implement Two factor authentication at login and withdrawal sections of the application…

Information Security Monthly Newsletter – July 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security. Each news item is very briefly summarized and includes a reference on the web for detailed information. We have tried to keep you…

Information Security Monthly Newsletter – June 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security during the last week. Each new item is very briefly summarized and includes a reference on the web for detailed information. We have…

Regular Expressions for Pentesters

What is a Regular Expressions ? Regular Expression is pattern which is used to match character combinations in a strings. Also known as regex or regexp. Programming Languages that support Regular Expressions ? Java Awk JavaScript Perl Python Php and more Benefits of using Regular Expressions ? Regular Expression helps…

IMPINJ SPEEDWAY R420 RFID READER

IMPINJ is an organization which connects billions of everyday items such as apparel, medical supplies and automobile parts to consumer and business applications such as inventory management, patient safety, and assets tracking. The impinj platform uses RFID to deliver timely information about these items to the digital world, thereby enabling…

Information Security Monthly Newsletter-May 2018

The newsletter consists of high-level executive summary of most of the important news, articles, data breaches and Microsoft patches details that have been published on information security during the last week. Each new item is very briefly summarized and includes a reference on the web for detailed information. We have…

Invoice Plane V 1.5 Cross Site Scripting Vulnerability-CVE-2017-18217

ISECURION is actively involved to secure the open source applications, and dedicating our time, talent and resources for the greater good, it was never a severity or name based hunt for us, we involve in security testing of all type platforms in information security such as application, network and hardware…

Case Study – Penetration Testing Crypto Currency Exchange

Recently we have performed a pentest for a crypto currency exchange site and below are the complete case study of the engagement. Case Study – Penetration Testing Crypto Currency Exchange Introduction: This case study of a start-up company in India who have started Crypto currency exchange in Indian market. Challenges:  …