Always use the Telecom 5G network with a VPN; avoid any wireless connections Disable Face ID and enable fingerprint and Passcode (PIN) Download apps only from the official App Store and avoid jailbreaking the device Regularly back up iPad data to iCloud or iTunes to prevent data loss Use privacy-focused browsers like Brave or Vivaldi […]


March 14, 2024

A story of how Security Misconfiguration led to Compromising the Domain Controller What is an Assured Breach? Assumed breach, as the name suggests, is when an attacker has already gained access to the internal network or has compromised an employee machine. This means that the attacker has a foothold in the organization. In our case, […]


July 29, 2022

Last week a Remote Code Execution vulnerability was disclosed in Spring. Spring is an open-source application framework that provides infrastructure support for creating Java applications that can be deployed on servers as independent packages. Approximately, 70 percent of all Java applications use it. What is CVE-2022-22965? CVE-2022-22965 was assigned to the vulnerability and is considered […]


April 23, 2022

The last 2-3 years have seen a spike in the adoption of cloud especially among organizations who had possibly never thought about moving to a shared environment due to security concerns like large corporations, banking, financial services, etc. The main drivers have been efficiency, easiness, flexibility, scalability, lower TCO among others. This adoption was further […]


December 1, 2020

Ready to Start?​


Drop your CVs to joinourteam@accorian.com

Interested Position

Download Case study

Download SOC2 Guide