Preparing a Strong Defence against Cyber Warfare amidst Growing Geopolitical Unrest

Preparing a Strong Defence against cyber warfare

Everyone from developing nations to world-leading economic powers has either adopted or is in the process of adopting digital forms of operations. But as is the case with any technological advancements, despite making our lives […]

Edtech – The New Prime Target For Cyber Attacks This Year

Children are the most vulnerable of us. As an edtech business, it is your responsibility to protect your students’ data and private information, at all costs. Are you prepared?

Covid-19: How to keep your organisation safe

the number of COVID-19-related cyberattacks has increased

With the World Health Organization (WHO) announcing Coronavirus Disease 2019 (COVID-19) as a pandemic, organizations worldwide are being asked to shift to a remote workforce to curb its spread. Capitalizing on the situation are hackers […]

Web Application Firewall

Digital transformation is driving more and more enterprises to migrate a large number of their services to the cloud. In the face of increasing frequency of Distributed Denial of Service (DDoS) and automation attacks against […]

8 years of Cybersecurity at Entersoft

This year marks the 8th year of cybersecurity at Entersoft Security! Firstly, a big thank you to all our clients, partners, and employees for all your support through the years. Entersoft was launched with a […]

Securing AWS Cryptographic Keys

Securing AWS Cryptographic Keys from cyber attack , enabling security features, is becoming a tough task nowadays. Recently, an AWS employee, DevOps Cloud Engineer, leaked over a gigabyte worth of data to a personal GitHub […]

Vidar Malware

Vidar malware – a boon for cyber attacks, introduced in December 2018, is a family of malware and trojan horse virus that steals sensitive information and cryptocurrency from infected users. Presumed to have originated in […]

OWASP TOP 10 API SECURITY RISKS

API SECURITY

Why OWASP API Top 10? The Open Source Web Application Security Project has compiled a list of the 10 biggest OWASP API security threats faced by organizations. According to the Gartner API strategy maturity model […]

Open-source Intelligence

Have you ever thought that the Amazon AWS access credentials of your company can be found in GitHub? Assume that, your company is relying on amazon web service and GitHub and the web application server […]

Misconfigured AWS S3 storage Bucket Enumeration

AWS S3 is easy-to-use object storage with a simple web service interface that you can use to store and retrieve any amount of data from anywhere on the web. Amazon S3 also allows you to […]