Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.

Trainings

We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Beware Android Users! Hackers could use “SpyNote” named Trojan to Record Your Calls!   Security Researchers have found “SpyNote” named Trojan on dark web. The Trojan has been leaked its authors in a number of underground forums. Hackers could use this Trojan very soon, to target Android users. This Trojan is capable to record all the “Incoming” and “Outgoing” calls of victim. This is a dangerous Trojan and researchers have no idea, how hac

Top 5 Mistakes which cause Security Breaches in IT companies! Violation of Security Policies of any Company is called Security Breach. Security breach happens when a person and any web application got entry into restricted confidential area of a Company, by using an illegal method. These types of Security Breaches can lead a company to huge risk because bad actors can hack into system, database and network of company for stealing their sensitive data and information. A company could loose his

DroidJack users! Prison is waiting for you! In European countries, Authorities has announced that they have start an operation to arrest the cyber criminals, which are using DroidJack named RAT (Remote Administration Tool).                                     According to a recent research conducted by Recorded Future, Android RATs are very popular among the cyber criminals. In the Middle East and A

Researchers at Trend Micro have detected an Espionage tool acting as a Spyware in iOS devices. Trend Micro posted a report on a continued investigation on Operation Pawn Storm, which is an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defense industries, and the media. In this report, the researchers unraveled an iOS Malware responsible for infecting many iOS devices and working as a Spyware for cy