Blog
Blog
AntiVirus Evasion Techniques
Introduction Antivirus software looks for, detects, and eliminates viruses as well as other harmful software such as worms, trojans, adware,
Blog
Blog
JSON Web Tokens – Attack and Defense
In this blog, we will learn about JSON web tokens and advantages of using them over traditional methods of authorization
Blog
Blog
The Havoc of MS Exchange Servers: Is it only Hafnium or somebody else as well?
As per the recent attacks on Microsoft Exchange Server by the Chinese threat group named Hafnium, at least 60,000 companies
Blog
Blog
Is it time for evolution of Vulnerability Management?
We all know that vulnerability is a weakness in any type of system which can be exploited by hackers to
Blog
Blog
Agile VAPT for a better ROI
What if I told you that you can increase your secure application release timeline efficiency by 70%? Or in other
Blog
Blog
Use Case – Automating Cybersecurity Deployment in the Oil & Gas Industry
The oil and gas industry heavily depends on Operational Technology for managing the industrial process. However, industrial systems are highly
Blog
Blog
Why Penetration Testing as a Service
Introduction Security vulnerabilities are a reality faced by the digital world at an increasing fast pace. Given this reality, penetration
Blog
Blog
An effective Cybersecurity program?
The ever-growing threats of cyberattacks have made every small and big enterprise spend a fortune on implementing a vigilant and
Blog
Blog
Penetration Testing in 2020
Why do you require Pentest as a Service (PTaaS)? In the early era the abilities of a computer to share
Blog
Blog
Is the answer to cyber resilience more security analysts or security automation?
Attackers are evolving everyday with new tactics, techniques, and procedures to launch sophisticated attacks and it seems defence is becoming
1 4 5

What’s new on HivePro

Get through updates and upcoming events, and more directly un your inbox