Blog

September 9, 2025
Sysmon in Cyber Defense: Enhancing Threat Visibility 

Sysmon, short for System Monitor, is a Windows system service and driver provided by Microsoft’s Sysinternals suite. It logs detailed information about system activity to the Windows Event Log, which is far beyond what standard logging offers.   With Sysmon, you can track things like process creation, network connections, file changes, and registry modifications, along with […]

Read More
August 25, 2025
Integer Overflow Vulnerability: The Hidden Bug behind the Crash

In the world of software development, we often focus on obvious threats like SQL injection or cross-site scripting. However, lurking beneath the surface, a more subtle yet equally dangerous vulnerability exists, known as Integer Overflow. This seemingly innocuous issue can lead to application crashes, unexpected behaviour, and even security breaches if not properly addressed.  The […]

Read More
May 15, 2025
Understanding LLMs: A Prerequisite for AI Security

Artificial Intelligence (AI) has advanced rapidly in recent years, with Large Language Models (LLMs) playing a key role. LLMs are driving groundbreaking advancements in Natural language Processing (NLP), automation, and decision-making. And, businesses are widely using LLMs to enhance efficiency, improve customer interaction, and generate valuable insights.  However, despite their advantages, LLMs also come with […]

Read More
April 29, 2025
OTP Bypass via Response Manipulation

One-Time Passwords (OTPs) are widely used as a security measure for authenticating users, offering an additional layer of protection against unauthorized access. However, vulnerabilities like OTP bypass via response manipulation can significantly weaken the effectiveness of this multi-factor authentication method. The response manipulation technique allows attackers to gain unauthorized access by intercepting and altering the […]

Read More
April 15, 2025
IDOR: The Silent Gateway to Data Breaches 

Discover the effective strategies to identify, mitigate, and secure your applications against Insecure Direct Object References (IDOR) vulnerabilities.

Read More
February 25, 2025
Supply Chain Security Best Practices Explained: Frameworks, Standards, and Regulations 

In today's highly interconnected world, securing the supply chain has become more critical than ever. As businesses increasingly rely on global networks, the potential for disruptions, cyberattacks, and fraud has grown exponentially. The complexity of modern supply chains - spanning across multiple industries, countries, and partners creates a landscape that is both dynamic and vulnerable, […]

Read More
January 21, 2025
Supply Chain Security: A Comprehensive Overview

Explore supply chain security, its threats, challenges, and trends to maintain operations and enhance business resilience. Discover essential insights!

Read More
AuthenticOne
2nd Floor. 265 1st Main, 6th Cross Rd, Domlur, Bengaluru, Karnataka 560071
Subscribe to newsletter
2024 - Copyright AuthenticOne, All Rights Reserved
pencildatabaseselectcrossmenuchevron-rightlayers linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram