The technology is evolving at a much higher pace than ever and so are the cyber security threats. Everyone is curious to learn, what is next in cyber security. Well, no offense, I could even […]
We are delighted to share that Torrid Networks’ researcher, Saurabh Pundir, was recently recognized in the Microsoft Security Response Center (MSRC) Bounty Program Top 100 list. The list was revealed at Black Hat USA 2016 […]
We just received an email with a word attachment and content trying to convince us to open the attached document as can be seen from the below screenshot: We did got convinced to open the attachment, but instead […]
This case study is in continuation to the press release published at: http://www.torridnetworks.com/press-events/press-releases/uae-companies-being-targeted-by-the-hackers The entire incident was started with an email sent from a spoofed email address fundtransferdpt@hsbc.com to the victim working in the accounts […]
Oops! We did it again! – Our experts are once again recognized by Microsoft, Sony, WePay and OK.ru for disclosing vulnerabilities in their systems. Torrid Networks is known for its cutting-edge information security services being catered to […]
Torrid Networks was recently engaged in web application security assessment for a top nodal agency processing highly classified information. Along with few common misconfigurations, some serious security issues were detected in the web application security […]
During a recent engagement to audit an application for a large telecom provider, Torrid Networks’ expert application security team encountered few XPATH injections in the application. The application was though also observed to contain many […]
Torrid Networks was recently engaged by a large software company to investigate the rising spam issues with their corporate mail server. Company had over 2500 mailboxes with a software based anti-spam solution. The same solution […]
Torrid Networks was recently engaged by a Gurgaon, Delhi NCR, INDIA based company to conduct a comprehensive penetration testing of its content filtering infrastructure. Customer is using Websense content filtering product to filter the non-business […]
A critical security vulnerability has been uncovered in the GNU Bourne Again Shell (Bash) by a security researcher, Stephane Chazelas. Attackers can remotely exploit the security flaw to gain complete access to the system, confidential […]