POOJA GAONKAR, Author at GBHackers - Latest Cyber Security News | Hacker News https://gbhackers.com/author/pooja-gaonkar/ Cyber Security News, Hacking News, Information security, Cyber Security, Penetration testing Wed, 26 Jul 2023 10:08:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.2 116523949 Android Application Penetration Testing Part 3 https://gbhackers.com/android-application-penetration-test-part-3/ https://gbhackers.com/android-application-penetration-test-part-3/#respond Mon, 10 Jul 2023 17:17:00 +0000 https://gbhackers.com/?p=8614 In my last article( Android Application Penetration Testing Part 1 ), ( Android Application Penetration Testing Part 2 )we had look at basic architecture and penetration testing tools. Now Let’s dig deeper with ADB. Android Debug Bridge Android Debug Bridge (ADB) is a versatile command-line tool that lets you communicate with a device Adb install […]

The post Android Application Penetration Testing Part 3 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/android-application-penetration-test-part-3/feed/ 0 8614
Web Application Attacks – Types, Impact & Mitigation – Part-2 https://gbhackers.com/web-application-attacks-part-2/ https://gbhackers.com/web-application-attacks-part-2/#respond Mon, 10 Jul 2023 05:10:00 +0000 https://gbhackers.com/?p=44535 With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2 we are covering the following attacks. Session Fixation The session fixation attack is a class of Session Hijacking, which steals the established session between the client and the Web Server after the user logs in. Instead, the Session Fixation attack fixes an established session on […]

The post Web Application Attacks – Types, Impact & Mitigation – Part-2 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/web-application-attacks-part-2/feed/ 0 44535
Android Application Penetration Testing – Part 7 https://gbhackers.com/android-application-penetration-testing-part-7/ https://gbhackers.com/android-application-penetration-testing-part-7/#respond Sun, 09 Jul 2023 19:51:00 +0000 https://gbhackers.com/?p=11983 In the Last Part, Android Application Penetration Testing Part 6 We have seen about the Vulnerabilities has been categorized as TOP 10. INSECURE LOGGING- ADB Logcat: Logcat is a command-line tool that dumps a log of system messages, including stack traces when the device throws an error and messages that you have written from your app […]

The post Android Application Penetration Testing – Part 7 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/android-application-penetration-testing-part-7/feed/ 0 11983
Android Application Penetration Testing Part 2 https://gbhackers.com/android-application-penetration-testing-part-2/ https://gbhackers.com/android-application-penetration-testing-part-2/#comments Sat, 01 Jul 2023 14:00:00 +0000 https://gbhackers.com/?p=8509 With my last article(Android Application Penetration testing Part 1) we had look at the basic architecture of the Android device. Now Let’s collect some Android Application Pentesting tools and build setup for hacking: There are many tools for an android application penetration test, But which tools are used for which purpose and which details we […]

The post Android Application Penetration Testing Part 2 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/android-application-penetration-testing-part-2/feed/ 1 8509
Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide https://gbhackers.com/event-logs-cyber-security-operations-center/ https://gbhackers.com/event-logs-cyber-security-operations-center/#respond Tue, 20 Jun 2023 05:54:00 +0000 https://gbhackers.com/?p=12655 Cyber Security operations center is protecting organizations and the sensitive business data of customers. It ensures active monitoring of valuable assets of the business with visibility, alerting and investigating threats, and a holistic approach to managing risk. Analytics service can be an in-house or managed security service. Collecting event logs and analyzing logs with real-world […]

The post Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/event-logs-cyber-security-operations-center/feed/ 0 12655
Android Application Penetration Testing – Part 1 https://gbhackers.com/android-application-penetration-testing-1/ https://gbhackers.com/android-application-penetration-testing-1/#comments Mon, 12 Jun 2023 13:58:00 +0000 https://gbhackers.com/?p=8459 Android security testing is more often used by security industries to test the vulnerabilities in Android applications. After web applications, the more concern area is mobile application penetration test Let’s start with some basics. Also, we recommend you take the best Android Hacking and Penetration Testing Course online to enhance your Android hacking skills. The basic […]

The post Android Application Penetration Testing – Part 1 appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/android-application-penetration-testing-1/feed/ 1 8459
Why is DevOps Crucial for Modern Businesses? https://gbhackers.com/why-is-devops-crucial-for-modern-businesses/ https://gbhackers.com/why-is-devops-crucial-for-modern-businesses/#respond Mon, 20 Mar 2023 04:11:00 +0000 https://gbhackers.com/?p=64949 With changing times and various new business adaptations, DevOps have become an integral part of the growth and efficiency of a business. With proper assessment of the core tools and structural phenomenon, DevOps ensure fast and reliable service delivery and productive software development. Prominent corporations like Microsoft, Atlassian, and IBM have been using DevOps for […]

The post Why is DevOps Crucial for Modern Businesses? appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/why-is-devops-crucial-for-modern-businesses/feed/ 0 64949
Data Security With Cloud Compliance: Meeting Regulations & Standards https://gbhackers.com/data-security-with-cloud-compliance/ https://gbhackers.com/data-security-with-cloud-compliance/#respond Mon, 13 Mar 2023 10:50:34 +0000 https://gbhackers.com/?p=64746 Businesses from all industries are aware of the benefits of cloud computing. Some organizations are just getting started with migration as part of digital transformation initiatives, while others are implementing sophisticated multi-cloud, hybrid strategies. However, data security in cloud computing is one of the most challenging deployment concerns at any level due to the unique […]

The post Data Security With Cloud Compliance: Meeting Regulations & Standards appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/data-security-with-cloud-compliance/feed/ 0 64746
Migrating Data Safely: A Cyber Security Checklist for Enterprises https://gbhackers.com/migrating-data-safely-a-cyber-security-checklist-for-enterprises/ https://gbhackers.com/migrating-data-safely-a-cyber-security-checklist-for-enterprises/#respond Wed, 15 Feb 2023 18:26:00 +0000 https://gbhackers.com/?p=64571 In many ways, you can compare data migration to moving to a new house. While the prospect of starting anew in a different environment can be exciting, there is always an inherent risk that you might unintentionally forget something important or even worse – irrevocably damage something that cannot be replaced. However, when it comes […]

The post Migrating Data Safely: A Cyber Security Checklist for Enterprises appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/migrating-data-safely-a-cyber-security-checklist-for-enterprises/feed/ 0 64571
Securing Kubernetes Deployments on AWS – Guide https://gbhackers.com/securing-kubernetes/ https://gbhackers.com/securing-kubernetes/#respond Tue, 06 Dec 2022 19:34:24 +0000 https://gbhackers.com/?p=63433 Kubernetes Deployment on AWS Kubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon EC2 instances, run containers on those instances, and perform deployment, maintenance, and scaling processes. Kubernetes lets you run containerized applications on-premises and in the cloud using the same set of tools. AWS offers […]

The post Securing Kubernetes Deployments on AWS – Guide appeared first on GBHackers - Latest Cyber Security News | Hacker News.

]]>
https://gbhackers.com/securing-kubernetes/feed/ 0 63433