Written By: Darshana Mechanda ||  An essential part of an organization’s annual cybersecurity plan is having an independent entity conduct penetration testing across its assets. This entails finding and evaluating weaknesses in networks, applications, APIs, cloud assets, and other systems. The National Vulnerability Database (NVD) recorded 28,831 vulnerabilities in 2023. This figure highlights the ever-expanding […]


October 3, 2024

Written By: Vivek Kumar Jaiswal|| In the realm of web application security, even minor misconfigurations can have unforeseen consequences. This article delves into a critical vulnerability exposed by a seemingly simple oversight: a debugging console left enabled in a Ruby on Rails application. We’ll explore how this seemingly harmless feature can be exploited to gain […]


March 27, 2024

Always use the Telecom 5G network with a VPN; avoid any wireless connections Disable Face ID and enable fingerprint and Passcode (PIN) Download apps only from the official App Store and avoid jailbreaking the device Regularly back up iPad data to iCloud or iTunes to prevent data loss Use privacy-focused browsers like Brave or Vivaldi […]


March 14, 2024

Written By Kanav Gupta II  According to Cybersecurity Ventures, cybercrime will cost $8 trillion globally in 2023, equivalent to the world’s third-largest economy after the U.S.A and China. These staggering figures underscore the urgent need for governments and cybersecurity professionals to collaborate globally in combating cybercrime. Implementing robust laws and security measures safeguards individuals, organizations, […]


July 19, 2023

Written By Abhijeet Karve II  The demand for innovative software solutions has thrived in today’s ever-changing dynamic world. The open-source services market is rising rapidly as businesses seek cost-effective, reliable solutions. Research suggests the open-source services industry will increase at a 21.75% CAGR and be worth $66.84 billion by 2026. This meteoric rise indicates open-source technologies’ […]


July 18, 2023

Written By Ashritha Alva II  Penetration testing is a crucial practice in today’s cybersecurity landscape. It involves assessing the systems, applications, security devices, etc. to identify potential entry points for adversaries. The question of whether penetration testing is an ART, or a SCIENCE has long been debated. While some argue that it requires technical expertise and […]


June 9, 2023

Written By Aakash Kumar II  Imagine a world where you have to remember passwords for every website and network you want to use. You’d be constantly typing in your passwords, making it easy for others to access your sensitive information. Even with passwords, there exist vulnerabilities, such as Kerberoasting, a hacking technique that exploits flaws […]


April 25, 2023

“An ounce of prevention is worth a pound of cure” – a famous quote by Benjamin Franklin that perfectly captures cybersecurity’s importance in today’s digital world. This is especially true for companies that must safeguard their sensitive data and systems from ever-increasing cyber threats and attacks. Therefore, companies must conduct penetration testing to enhance their […]


April 20, 2023

Written by Premal Parikh  II Numerous security firms perform penetration testing and red teaming. However, determining the security firm suitable for your organization is difficult. So how do you select the right firm for your Pentesting services? One must consider factors such as the firm’s experience, methodology, and cost-effectiveness while making the right choice. Security […]


March 17, 2023

Written by Vivek Jaiswal II  Reconnaissance is an essential phase in Penetration Testing, before actively testing targets for vulnerabilities. It helps you widen the scope & attack surface and helps uncover potential vulnerabilities. There are already multiple open-source and proprietary automated tools available in the market to perform reconnaissance or scan any host/application for vulnerabilities, […]


October 20, 2022

Ready to Start?​


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide