Security DB

With an aim to address rapidly evolving spectrum of cyber threats , We are continuosuly working and developing huge vulnerability and security repository that keep track of all recently released exploits changing the way analysts share and research threat intelligence. Keep your vulnerability database updated with CDI's repository of latest exploits.

Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert lever we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

10 Best Practices for Cyber Security

Posted By: Ljsingh / Sep 4, 2015 / 

These 10 Best Practices for Cyber Security will make your organisation more secure. With the increase in number of hackers, malwares and other threats to your cyber security out there, you can always find a new security practice to enact. This article also contains practices for Good Computing.      1. Creating Specific Access ControlsYou need to be very careful about whom you are giving the control of different sections of your organization. Ideally, it shouldn’t be anyone. When you crea

Cylance Researchers have discovered a major vulnerability in Windows Operating System. A new technique has been found for stealing login credentials from any Windows System, tablet or even Server. All Major versions of the OS are affected including the yet to release Windows 10. The software products from 31 companies are said to be affected by this vulnerability, which marks Adobe, Apple, Box, Microsoft, Oracle and Symantec on the line. The Vulnerability Redirect to SMB vulnerability allows a

The Social Network Giant, Facebook was recently in news for tracking even the non-users of its service. In other words, if you don't even have a Facebook Account, still you are being tracked by Facebook Inc. This is scary! At least for those who chose to be anonymous, and don't register for Facebook.In a recent report, Facebook researchers have claimed to find a "bug" that simply allowed them to track people who haven't ever visited the website.The disclosure was made public by Richard Allen, th

In a surprising decision with release of OS X 10.10.3 on April 8th, Apple Inc. has made it clear that it won't be fixing Rootpipe Vulnerability. With the release of new version of OS X, Apple fixed nearly 80 security issues affecting components such as the admin framework, Apache, ATS, CFNetwork, CoreAnimation, FontParser, hypervisor, ImageIO, IOHIDFamily, the kernel, LaunchServices, libnetcore, NTP, OpenSSL, PHP, QuickLook, SceneKit, UniformTypeIdentifiers, and WebKit. The patched

On March 24th, the highest court of land, Supreme Court of India will pronounce its verdict on the validity of 66A IT act amendment which has been in the eye of storm due to it's draconian powers. Ever since this amendment came into effect in 2009, there have been numerous cases being filed against common citizens for their online posts on social media namely, Twitter & Facebook. 66A. Punishment for sending offensive messages through communication service, etc. Any person who sends

Securify, a dutch security firm, have revealed a serious vulnerability in Pinterest and Yammer iOS apps, which can lead bad actors to perform Man-in-the-Middle attacks. In an official tweet, Securify showed how burpsuite disclosed the passwords sent over the network within apps and are clearly visible. The vulnerability in the application is caused due to failure of server certificates validation, allowing bad actors to eavesdrop in users' talks. But the issue has been fixed in the latest v

Is Google Spying on You?

Posted By: Ljsingh / Apr 8, 2015 / Google, Spying

Ever wondered about being snooped online by the big tech companies? Does it raise an alarm in your head? Yes, big tech giants from Amazon to Apple keeps a record of your online activities but no one does it like, Google. The most important word toddlers learn these days after mom and dad is Google. For almost every online user, internet is google and google is internet. The tech company has hundreds of tools for it's users which make their life simpler day after day. But convenience comes at a p

Sucuri have released a security advisory stating a DANGEROUS Persistent XSS Vulnerability in WP-Super Cache plugin used by Millions of Wordpress websites (according to The Vulnerability This vulnerability could be leveraged by an attacker by creating a carefully crafted query, further used to insert malicious scripts to the plugin's cached file listing page. "As this page requires a valid nonce in order to be displayed, a successful exploitation would require the site

Every upcoming major tech company face a host of challenges in running operations. Their systems are regularly targeted by hackers and the attack that is used as a weapon by them mostly is, "DDoS or generally known as Distributed Denial of Service" attacks. This is the most basic attack used by hackers but it's consequences are severe if the attackers are able to penetrate the security firewalls. The attacks are carried out by in order to make network resources unavailable to it

In a shocking incident, it was found that two shop owners on Dark Web marketplace are selling Uber usernames and passwords openly. According to a news website, a person with handle "Curvoisier" is claiming to sell Uber logins for $1 each on AlphaBay Market, which launched in late 2014. Another vendor, "ThinkingForward," sells the same items for $5 each. In a note Courvoisier writes: "The credentials provided will be a valid login for the Uber website for which you can