Blog

October 23, 2025
7 Cybersecurity Challenges Companies Face Without a Security Operations Center (SOC)

The Silent Cost of Staying Unmonitored If you ask most CISOs what keeps them awake at night, more than the thought of a firewall misconfiguration or an expired SSL certificate it’s what they don’t see.  Modern attacks are no longer noisy. They’re patient, staged, and often unfold across weeks or months. By the time an […]

Read More
October 10, 2025
What Keeps CISOs Awake? – It’s Not Just Hackers, It’s Compliance.

CISOs today are no longer just defenders of the network; they are strategic business leaders sitting at the crossroads of innovation, regulation, and risk.  Every new technology, AI, cloud, IoT, 5G, quantum computing promises growth but also multiplies exposure. Boards want agility, regulators want assurance, and customers want trust.  The challenge? Balancing it all.  In […]

Read More
September 9, 2025
Sysmon in Cyber Defense: Enhancing Threat Visibility 

Sysmon, short for System Monitor, is a Windows system service and driver provided by Microsoft’s Sysinternals suite. It logs detailed information about system activity to the Windows Event Log, which is far beyond what standard logging offers.   With Sysmon, you can track things like process creation, network connections, file changes, and registry modifications, along with […]

Read More
August 25, 2025
Integer Overflow Vulnerability: The Hidden Bug behind the Crash

In the world of software development, we often focus on obvious threats like SQL injection or cross-site scripting. However, lurking beneath the surface, a more subtle yet equally dangerous vulnerability exists, known as Integer Overflow. This seemingly innocuous issue can lead to application crashes, unexpected behaviour, and even security breaches if not properly addressed.  The […]

Read More
June 25, 2025
AuthenticOne Achieves Prestigious CREST Accreditation

AuthenticOne - A CREST Accredited Company for Penetration Testing  We are proud to announce that we are now a CREST accredited for penetration testing. In addition to individual accreditations/certification like CISSP, CCSP, CRISC, CISA, OSCP, CompTIA Security+, Microsoft Azure Security, AWS Security and many more, CREST accreditation for AuthenticOne as organisation is a milestone that emphasizes […]

Read More
June 5, 2025
SQL Injection: A Hacker's Backdoor into Your Database  

SQL Injection is a serious cybersecurity threat that allows attackers to manipulate database queries and gain unauthorized access to sensitive information. By inserting malicious code into input fields, they can steal data, alter records, or even take control of an entire system. This vulnerability often arises from improper handling of user inputs in applications. In […]

Read More
May 29, 2025
Securing LLMs: Defending Against Emerging Threats 

LLM Security, AI Security, Large Language Models, LLMs, AI Threats

Read More
May 15, 2025
Understanding LLMs: A Prerequisite for AI Security

Artificial Intelligence (AI) has advanced rapidly in recent years, with Large Language Models (LLMs) playing a key role. LLMs are driving groundbreaking advancements in Natural language Processing (NLP), automation, and decision-making. And, businesses are widely using LLMs to enhance efficiency, improve customer interaction, and generate valuable insights.  However, despite their advantages, LLMs also come with […]

Read More
May 8, 2025
Fortifying Docker: Security Deep Dive & SIEM Integration for Proactive Defense 

As businesses increasingly rely on containerized environments for scalability and efficiency, Docker has become a cornerstone of modern application deployment. However, security challenges persist, demanding a proactive approach to safeguard infrastructure.  In our previous blog, Docker Demystified: Laying the Foundation for a Secure Containerized Future, we covered Docker fundamentals, its architecture, and steps to get […]

Read More
April 29, 2025
OTP Bypass via Response Manipulation

One-Time Passwords (OTPs) are widely used as a security measure for authenticating users, offering an additional layer of protection against unauthorized access. However, vulnerabilities like OTP bypass via response manipulation can significantly weaken the effectiveness of this multi-factor authentication method. The response manipulation technique allows attackers to gain unauthorized access by intercepting and altering the […]

Read More
AuthenticOne
2nd Floor. 265 1st Main, 6th Cross Rd, Domlur, Bengaluru, Karnataka 560071
Subscribe to newsletter
2024 - Copyright AuthenticOne, All Rights Reserved
pencildatabaseselectcrossmenuchevron-rightlayers linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram