Security DB

With an aim to address rapidly evolving spectrum of cyber threats , We are continuosuly working and developing huge vulnerability and security repository that keep track of all recently released exploits changing the way analysts share and research threat intelligence. Keep your vulnerability database updated with CDI's repository of latest exploits.

Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.

Trainings

We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert lever we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

[caption id="attachment_572" align="aligncenter" width="609"] Syrian electronic army hacked Israeli twitter account[/caption] One of the famous hacking group Syrian Electronic army today hacked the Israeli Army Twitter account. The hackers posted a tweet saying, Nuclear facility in Israeli have been hit by 2 rockets. As soon as the message was released it created a sense of panic among the people of Israeli. Also SEE: Domino's website hacked Israeli Army twitt

[caption id="attachment_562" align="aligncenter" width="550"] wysija MailPoet Wordpress Plugin[/caption] A famous security firm Sucuri has found a bug in the MailPoet WordPress plugin which has made more than 1,700,00 websites vulnerable to cyber attacks. Marc-Alexandre Montpas a researcher from the website security firm Sucuri has found this flaw few weeks ago and sent it to the MailPoet WordPress plugin developers. How to hack WordPress website using MailPoet? M

[caption id="attachment_515" align="aligncenter" width="650"] Facebook users news feed experiment[/caption] Popular media giant Facebook is now showing its own monotony over its website. Facebook manipulated with users feed in secret experiment and checked what type of response does the users give to different comments.What was the experiment made by Facebook?Facebook officially revealed that it made an experiment on 689,003 users. The experiment was performed to study the human behavior through

[caption id="attachment_508" align="aligncenter" width="484"] bayfiles.net removed by google[/caption] Pirate Bay's most famous file hosting service provider Baysfiles.net is removed by Google. Now you need to directly open the bayflies.net website in the URL bar. If you would try to search bayfiles.net on Google you would get zero search results.Also SEE: DNS sinkholes the best weapon to protect your website. What is Bayfiles.net? Bayfiles.net is one of the m

[caption id="attachment_435" align="aligncenter" width="380"] DNS Sinkhole prevent against malware attack[/caption] In today's era, where the malware attacks are increasing day by day DNS sinkhole is the best way to protect your website from it. DNS sinkholes are also known as sinkhole server, internet sinkhole or blackholeDNS. What actually does this DNS sinkhole do? In simple words, DNS sinkholes sends false information to the servers so as to prevent the un

[caption id="attachment_408" align="aligncenter" width="579"] Stuxnet worm affecting the Iran nuclear programme[/caption] A very famous malware Stuxnet which was designed to attack the industrial logical controllers. A similar malware named Havex Malware is designed for the cyber attacks on the organisations associated with the energy sector. What is Stuxnet Malware? Back in 2010, Stuxnet worm was designed to destroy the Iranian nuclear project. Stxunet has three

Web Application Security Services

Posted By: Ljsingh / Jan 4, 2015 / 

WEB APPLICATION PENTEST What is Web Application Pentest? A penetration test is a method of evaluating the security of a computer system by simulating an attack. A web application penetration test focuses only on evaluating the security of a web application. The process involves an active analysis of the application for any weaknesses, technical flaws, or vulnerabilities. Any security issues that are found will be presented to the system owner, together with an assessment of the impact, a propo

[caption id="attachment_354" align="aligncenter" width="360"] Google launches new gmail api[/caption] After the success of the Gmail IMAP and POP, Google launched a new Gmail API for the app developers. The new GMAIL API launched would give an easy access to data for those who want to build GMAIL integrated apps. The question is that how this new GMAIL API launched would change the experience of using GMAIL. Also see: Evernote Forum hacked What is GMAIL IMAP and POP? Before the new GMAIL A

One of the popular online database storage website Evernote was hacked today. The official Evernote Forum site is hacked affecting 164,644 members. The hackers stole the ID, password, date of birth and other private data.[caption id="attachment_332" align="aligncenter" width="278"] Evernote Forum site hacked[/caption] Evernote Forum Site Hacked As soon as the hackers hacked the Evernote Forum site, the company sent a mail to all its users to change the password of

Do you love to eat Dominos Pizza? Are you a big fan of Dominos Pizza? Have you made online account at Dominos Website? If your answer is yes to every question then you may get surprised after knowing a breaking news i.e Dominos website hacked. [caption id="attachment_302" align="aligncenter" width="433"] Dominos order pizza online[/caption] Dominos website hacked by Turkish hacker A famous Turkish group named as Ajan hacker group today hacked the official dominos