Security DB

With an aim to address rapidly evolving spectrum of cyber threats , We are continuosuly working and developing huge vulnerability and security repository that keep track of all recently released exploits changing the way analysts share and research threat intelligence. Keep your vulnerability database updated with CDI's repository of latest exploits.

Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert lever we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

In a surprising decision with release of OS X 10.10.3 on April 8th, Apple Inc. has made it clear that it won't be fixing Rootpipe Vulnerability. With the release of new version of OS X, Apple fixed nearly 80 security issues affecting components such as the admin framework, Apache, ATS, CFNetwork, CoreAnimation, FontParser, hypervisor, ImageIO, IOHIDFamily, the kernel, LaunchServices, libnetcore, NTP, OpenSSL, PHP, QuickLook, SceneKit, UniformTypeIdentifiers, and WebKit. The patched

Have been thinking from years that DLL Hijacking is just restricted to Windows only? Then let us make it clear, NO! It's nothing like that. Windows were found vulnerable to DLL Hijacking attacks years ago, but a latest research by a Security Firm research director, Patrick Wardle at Synack, revealed OS X are also similarly vulnerable to DLL Hijacking attacks. Mac OS X Dll Hijacking Patrick is going to show off this concept similar to Windows DLL Hijacking at CanSecWest Applied Security C

The trusted world's leading mobile operating system iOS has chinks in it's armour. It was reported earlier in late november on the iOS Masque attack which included replacing a legit application already on the phone with a malicious one through SMSs, mail & web and stealing the sensitive information including logins of user's account.The researchers at FireEye have found that the new set of iOS Masque Attack have become more refined which makes them more volatile than the previous edition. This t