Logo Dr. Soumyo Maity
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Tags
  • access
  • administrators
  • analysis
  • and
  • API
  • Application
  • architects
  • architecture
  • (ASM)
  • assessment
  • (AST)
  • Attack
  • attacks
  • auditing
  • automation
  • awareness
  • beginners
  • best
  • box
  • Browser
  • career
  • center
  • Cloud
  • Code
  • coding
  • compliance
  • composition
  • Container
  • Cross-site
  • culture
  • cycle
  • (DAST)
  • Data
  • Database
  • Denial-of-service
  • developers
  • development
  • DevSecOps_longer
  • (DLP)
  • (DoS)
  • Dynamic
  • education
  • Embedded
  • Encryption
  • engineering
  • engineers
  • Enterprise
  • escalation
  • event
  • everyone
  • executives
  • exploit
  • Extensible
  • firewall
  • for
  • Fuzz
  • governance
  • Grey
  • (IAM)
  • Identity
  • In-memory
  • incident
  • information
  • InfoSec
  • injection
  • Input
  • Integration
  • intelligence
  • interface
  • IT
  • language
  • life
  • loss
  • Malware
  • management
  • managers
  • markup
  • metrics
  • Mobile
  • modeling
  • monitoring
  • Network
  • Object-oriented
  • (OOP)
  • Open
  • Operating
  • operations
  • (OWASP)
  • Password
  • Phishing
  • Physical
  • policy
  • practices
  • prevention
  • Privilege
  • professionals
  • programming
  • project
  • protection
  • Ransomware
  • (RASP)
  • response
  • review
  • Risk
  • Runtime
  • (SAST)
  • (SCA)
  • scripting
  • (SDLC)
  • Secure
  • security
  • security_longer
  • self-protection
  • Side-channel
  • (SIEM)
  • (SOC)
  • software
  • Static
  • surface
  • system
  • systems
  • testers
  • testing
  • Threat
  • training
  • trust
  • validation
  • vulnerability
  • (WAF)
  • (WAST)
  • weaknesses
  • web
  • Wireless
  • (XML)
  • (XSS)
  • Zero
  • Zero-day
Hero Image
Zero-Day Attacks

Zero-day attacks are a type of cyber attack that exploits a vulnerability in software that is unknown to the software vendor. This means that there is no security patch available to fix the vulnerability, and attackers can exploit it to gain access to systems or steal data. Zero-day attacks are a serious threat to businesses and individuals. They can be used to steal sensitive data, such as credit card numbers or passwords, or to disrupt critical systems.

March 13, 2022 Read
Hero Image
Denial-of-service (DoS) attacks: A threat to your website

A denial-of-service (DoS) attack is an attempt to make a website or server unavailable to its intended users. DoS attacks achieve this by flooding the target with so much traffic that it is unable to handle legitimate requests. There are two main types of DoS attacks: Volume-based DoS attacks: These attacks send a large volume of traffic to the target, overwhelming its resources. Protocol-based DoS attacks: These attacks exploit vulnerabilities in the target’s protocols, such as HTTP or TCP.

July 28, 2020 Read
Hero Image
Side-Channel Attacks: Sneaking a peek at secrets

Side-channel attacks are a type of attack that exploits information that is leaked by a cryptographic system during its normal operation. This information can be leaked in a variety of ways, such as through power consumption, timing, or electromagnetic emissions. Side-channel attacks can be used to steal secrets, such as passwords, encryption keys, or other sensitive data. They can also be used to bypass security controls, such as firewalls and intrusion detection systems.

February 16, 2019 Read
Navigation
  • About
  • Recent Posts
  • Skills
  • Experiences
  • Education
  • Publications
Contact me:
  • soumyamaity@gmail.com
  • soumyamaity
  • Soumyo Maity, PhD
  • +91*********

Toha Theme Logo Toha
© Soumya Maity, 2023
Powered by Hugo Logo