The technology is evolving at a much higher pace than ever and so are the cyber security threats. Everyone is curious to learn, what is next in cyber security. Well, no offense, I could even […]
We are delighted to share that Torrid Networks’ researcher, Saurabh Pundir, was recently recognized in the Microsoft Security Response Center (MSRC) Bounty Program Top 100 list. The list was revealed at Black Hat USA 2016 […]
We just received an email with a word attachment and content trying to convince us to open the attached document as can be seen from the below screenshot: We did got convinced to open the attachment, but instead […]
Oops! We did it again! – Our experts are once again recognized by Microsoft, Sony, WePay and OK.ru for disclosing vulnerabilities in their systems. Torrid Networks is known for its cutting-edge information security services being catered to […]
A critical security vulnerability has been uncovered in the GNU Bourne Again Shell (Bash) by a security researcher, Stephane Chazelas. Attackers can remotely exploit the security flaw to gain complete access to the system, confidential […]
Torrid Networks is a leading information security company with its presence in the US, UK, UAE and India and working with 400+ organizations worldwide. Our ongoing investment into the area of research and innovation keeps […]
Its freezing cold outside and few of us were still at office in late hours to test our research appetite. Stomach was making some nasty noises and we thought of having some pizza. Most of […]
In below steps, we will try to share the approach which can help new comers in gaining better hang of network penetration testing. Most important part however is to focus on technology and concepts than tools.
There have been lot of similar questions regularly being posted to us by aspiring information security experts. In the interest of our future penetration testers or information security consultants to enter the industry with the […]
About Information Security Blog Its been on the way but we got flooded with lot of requests coming on social media channels to help penetration testing experts with their queries. Though, majority of requests came up […]