Saurabh JainRedis Secure Installation PracticesIn this blog, we’ll read about few best practices to install a Redis server securely.1 min read·Oct 12, 2023----
Saurabh JainServer-side vs. Client-side VulnerabilitiesLearn about the key technical differences between server-side and client-side vulnerabilities and how they can be exploited by attackers to…2 min read·Oct 12, 2023----
Saurabh JainMind-map for AWS Account ID Enumeration via Public S3 bucket.I recently stumbled upon the free byte-sized labs providing great learning experience for AWS Security Testing.1 min read·Oct 11, 2023----
Saurabh JainAnalyzing Breaches & Threat Landscape 20222022 saw a huge up-rise in the number of events directly or indirectly involving data breaches, social engineering attacks (especially this…2 min read·Nov 15, 2022----
Saurabh JainThreat Modelling Frameworks (SDL, STRIDE, DREAD & PASTA)As we all are aware of, vulnerability can be defined as the existence of flaw in a system’s design, implementation or operation that can…7 min read·Apr 22, 2021----