Resources

September 3, 2014

Torrid Networks’ experts recognized by Microsoft

Torrid Networks is a leading information security company with its presence in the US, UK, UAE and India and working with 400+ organizations worldwide. Our ongoing investment into the area of research and innovation keeps […]
January 9, 2014

Hackers getting free pizza at PizzaHut!

Its freezing cold outside and few of us were still at office in late hours to test our research appetite. Stomach was making some nasty noises and we thought of having some pizza. Most of […]
May 28, 2013

Learning Network Penetration Testing Or Ethical Hacking

In below steps, we will try to share the approach which can help new comers in gaining better hang of network penetration testing. Most important part however is to focus on technology and concepts than tools.
May 26, 2013

Network Penetration Testing or Application Security Assessment – Where to start from?

There have been lot of similar questions regularly being posted to us by aspiring information security experts. In the interest of our future penetration testers or information security consultants to enter the industry with the […]
May 24, 2013

Information Security Blog Initiative

About Information Security Blog Its been on the way but we got flooded with lot of requests coming on social media channels to help penetration testing experts with their queries. Though, majority of requests came up […]
April 18, 2010

Malware Analysis Report for a targeted attack via word document carried out against few sensitive email accounts belonging to elite customer of Torrid

Customer is from govt. sector responsible for carrying out few sensitive tasks which makes them an obvious and prime target for cyber attacks. Recently, few prominent email accounts belonging to customer received a suspicious email […]
November 12, 2009

Information Security Audit For A BPO And Knowledge Management Company

The customer offers Information Technology, BPO and Knowledge services to its various clients. Several Blue chip organizations have chosen them as a strategic partner to manage key result oriented areas of Information Technology, due to […]
March 10, 2009

Application Security Assessment For A Global Financial Services Company

The customer is a global financial services company, headquartered in New York City is best known for its credit card, charge card, and traveler’s cheque businesses. Following an era of international expansion, the company became […]
October 26, 2008

Implementation of CA eTrust Access Control For Government of India

Customer is a prime department under Government of India and processes highly sensitive financial information across its datacenters distributed at different locations in India. The department is mainly responsible for matters relating to levy and […]
July 29, 2008

Code Review and Web Application Security Assessment For a US State Department

Our client manages the country’s basic infrastructure through a complex network and planned to automate the billing process for the services it provides. They invested heavily in an automation system consisting of small, low-power radio […]