Author: Prithesh Durai

Exploiting Google OAuth Endpoint for Unauthorized User Session Hijacking

Exploiting Google OAuth Endpoint for Unauthorized User Session Hijacking

In the dynamic landscape of cybersecurity, a recent revelation by threat actor “Prisma” has brought to light a significant exploit that allows the generation of persistent Google cookies through token manipulation. This discovery, highlighted by CloudSEK’s threat intelligence researcher, Pavan Karthick M, has far-reaching implications, shaping the narrative of cyber threats in recent times.  

Read More
How to Prevent API Breaches: A Guide to Robust API Security

How to Prevent API Breaches: A Guide to Robust API Security

APIs provide great opportunities for businesses to interconnect systems and share data. However, they also introduce significant security risks if not properly protected. APIs have become the backbone of digital business, with over 90% of companies relying on them for their applications according to Red Hat. However, while APIs drive innovation, they also expand the

Read More
Mastering ISO 27001 Implementation: Your Comprehensive Handbook

Mastering ISO 27001 Implementation: Your Comprehensive Handbook

Introduction In today’s digital world, protecting sensitive information and data is of utmost importance. That’s why many organizations turn to international standards like ISO 27001 to establish robust information security management systems (ISMS). Implementing ISO 27001 can provide a framework for identifying risks, implementing controls, and ensuring the confidentiality, integrity, and availability of information. In

Read More
A Futuristic AI Approach to Implement ISO 27001

A Futuristic AI Approach to Implement ISO 27001

ISO 27001 is widely regarded as the premier international standard for implementing an information security management system (ISMS). It provides a systematic approach to managing sensitive company information and defending against cyber threats. Artificial intelligence is transforming how organizations approach information security. AI and machine learning algorithms can process huge volumes of data, identify patterns

Read More