Security DB

With an aim to address rapidly evolving spectrum of cyber threats , We are continuosuly working and developing huge vulnerability and security repository that keep track of all recently released exploits changing the way analysts share and research threat intelligence. Keep your vulnerability database updated with CDI's repository of latest exploits.

Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert lever we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Cylance Researchers have discovered a major vulnerability in Windows Operating System. A new technique has been found for stealing login credentials from any Windows System, tablet or even Server. All Major versions of the OS are affected including the yet to release Windows 10. The software products from 31 companies are said to be affected by this vulnerability, which marks Adobe, Apple, Box, Microsoft, Oracle and Symantec on the line. The Vulnerability Redirect to SMB vulnerability allows a

Securify, a dutch security firm, have revealed a serious vulnerability in Pinterest and Yammer iOS apps, which can lead bad actors to perform Man-in-the-Middle attacks. In an official tweet, Securify showed how burpsuite disclosed the passwords sent over the network within apps and are clearly visible. The vulnerability in the application is caused due to failure of server certificates validation, allowing bad actors to eavesdrop in users' talks. But the issue has been fixed in the latest v

Have been thinking from years that DLL Hijacking is just restricted to Windows only? Then let us make it clear, NO! It's nothing like that. Windows were found vulnerable to DLL Hijacking attacks years ago, but a latest research by a Security Firm research director, Patrick Wardle at Synack, revealed OS X are also similarly vulnerable to DLL Hijacking attacks. Mac OS X Dll Hijacking Patrick is going to show off this concept similar to Windows DLL Hijacking at CanSecWest Applied Security C

Samba Server, used popularly for Linux is found to be critically vulnerable to Remote Code Execution vulnerability. Samba is the most commonly used Windows interoperability suite of programs, used by Linux and Unix systems. The vulnerability is recently disclosed on Samba's official website mentioning the vulnerability with CVE id as CVE-2015-0240. The affected versions are found to be Samba 3.5.0 to 4.2.0rc4. According to Trend Micro researchers this Samba Server Vulnerability is said to be

In an official Security Advisory, Microsoft has revealed that it's Windows operating Systems are vulnerable to a FREAK SSL/TLS Flaw. The FREAK flaw is a loophole that allows hackers to initiate man-in-the-middle attacks on connections like Sockets Layer(SSL) and Transport Layer Security(TLS). These two security layers use outdated encryption to cipher. " Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of M

The once popular mail service Microsoft Outlook is the latest one to get caught in the nets of Phishing scam. The users of the service are receiving email as "Microsoft Account Team" with subject as to terminate your account. The emails contains an attached file in the form of a PDF. The mail states that the account team has received a request to terminate your account but if you had not made any such claim then view the attached file. The scam is a typical phishing technique whe