November 3, 2016

Torrid Networks’ Top 10 Cyber Security Predictions For 2017

The technology is evolving at a much higher pace than ever and so are the cyber security threats. Everyone is curious to learn, what is next in cyber security. Well, no offense, I could even […]
August 23, 2016

Torrid Networks Researchers Listed In MSRC Top 100 List

We are delighted to share that Torrid Networks’ researcher, Saurabh Pundir, was recently recognized in the Microsoft Security Response Center (MSRC) Bounty Program Top 100 list. The list was revealed at Black Hat USA 2016 […]
February 17, 2016

Notorious VBA macros within Word document

We just received an email with a word attachment and content trying to convince us to open the attached document as can be seen from the below screenshot:   We did got convinced to open the attachment, but instead […]
September 1, 2015

Torrid Networks recognized by Microsoft, Sony and More!

Oops! We did it again! – Our experts are once again recognized by Microsoft, Sony, WePay and for disclosing vulnerabilities in their systems. Torrid Networks is known for its cutting-edge information security services being catered to […]
September 25, 2014

Shellshock – Yet Another Cyber Shock!

A critical security vulnerability has been uncovered in the GNU Bourne Again Shell (Bash) by a security researcher, Stephane Chazelas. Attackers can remotely exploit the security flaw to gain complete access to the system, confidential […]
September 3, 2014

Torrid Networks’ experts recognized by Microsoft

Torrid Networks is a leading information security company with its presence in the US, UK, UAE and India and working with 400+ organizations worldwide. Our ongoing investment into the area of research and innovation keeps […]
January 9, 2014

Hackers getting free pizza at PizzaHut!

Its freezing cold outside and few of us were still at office in late hours to test our research appetite. Stomach was making some nasty noises and we thought of having some pizza. Most of […]
May 28, 2013

Learning Network Penetration Testing Or Ethical Hacking

In below steps, we will try to share the approach which can help new comers in gaining better hang of network penetration testing. Most important part however is to focus on technology and concepts than tools.
May 26, 2013

Network Penetration Testing or Application Security Assessment – Where to start from?

There have been lot of similar questions regularly being posted to us by aspiring information security experts. In the interest of our future penetration testers or information security consultants to enter the industry with the […]
May 24, 2013

Information Security Blog Initiative

About Information Security Blog Its been on the way but we got flooded with lot of requests coming on social media channels to help penetration testing experts with their queries. Though, majority of requests came up […]