acquia.com
How to responsibly report a security issue | Acquia
https://www.acquia.com/how-report-security-issue
Skip to main content. Acquia Cloud Site Factory. Locking Down the Cloud. Build a Drupal Team. How to responsibly report a security issue. Acquia's security team will respond to confirm receipt of your message, review and plan the mitigation of the issue appropriately, as well as set a timeline for a new release or patch. We follow responsible disclosure and will credit researchers when a security issue has been identified and mitigated while adhering to the following specifics. CSRF in forms available fo...
behinddefencely.blogspot.com
The Story Behind Defencely: June 2013
http://behinddefencely.blogspot.com/2013_06_01_archive.html
The Story Behind Defencely. Thursday, June 20, 2013. So Here's Story Behind Defencely. Lot of questions came after Vedachala. Posted XSS In Defencely. Which Was in Home Page of defencely.com. And People just buzzing me to fix that vulnerability, but when i told them I'm not part of defencely anymore. I faced lot of questions about why. My Small Introduction :. My Full Name is Atulkumar Hariba Shedage, ( Facebook. I'm security researcher and awarded by some giant internet companies like Google. Means secu...
behinddefencely.wordpress.com
Defencely : The Story Behind Defencely | Behind defencely
https://behinddefencely.wordpress.com/2015/08/11/the-story-behind-defencely
Defencely : The Story Behind Defencely. Defencely : The Story Behind Defencely. August 11, 2015. September 9, 2015. The Story Behind Defencely. Blogging Cage Interview Series (BCIS) has become one of the things which I am loving most at my blog. Not only I am enjoying interviewing industry experts but my readers are always pushing me forward to bring great persons here. Let’s have talk with him. 1 Please tell us about your background and your entrepreneurial journey. Somewhere in my head, a million thing...
blog.czarsecurities.com
“9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick! – Czar Securities
https://blog.czarsecurities.com/1077/9-5-job-is-too-old-school-for-a-hacker-meet-shritam-bhowmick
8220;9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick! November 16, 2014. Working as a Self-employed Security Researcher is Amazing, Thrilling, Challenging, Impacting, and Self Disciplinary focus coordinated multi-tasking problem tackling monster is what Shritam Bhowmick thinks a 9-5 job never will! What was that one moment when you thought that yes, cyber security, this is my field! How did you pursue that? End of all, I belong to a part of the Cyber Security arena, my quest and understand...
seotechyworld.com
BOOM! An awesome talk with Ritesh Sarvaiya, the founder of Defencely - SEOTechyWorld
http://seotechyworld.com/talk-with-ritesh-sarvaiya-founder-of-defencely
FGST: Free Presentation Templates for Google Slides. Starting Tips for SEO. SlideModel.com: Best Professional PowerPoint Templates. An awesome talk with Ritesh Sarvaiya, the founder of Defencely. I chanced upon this opportunity to interview Ritesh Sarvaiya, the founder of Defencely. One of the leading Indian security experts providing round-the-clock security services to major global websites. Is able to maintain into its portfolio and would continue to do so in the coming years. Defencely started up wit...
pwntoken.wordpress.com
December | 2014 | Shritam Bhowmick
https://pwntoken.wordpress.com/2014/12
Web Application Centric Security Research Blog. Cut the lips, utter the truth. The default about page! Breaking the Application with Shritam Bhowmick – Application Bruteforce Demystified. December 18, 2014. December 18, 2014. Web Form Brute Force Methods. Demonstration by Shritam Bhowmick. Web Application Penetration Tester. Independent Consulting Security Evangelist. Method 1: Using Hydra to Brute Force Web Logins. Method 2: Using Burp Suite Intruder to Brute Force Web Logins. Continue reading →. Of inc...
pwntoken.wordpress.com
Shritam Bhowmick Explains HTTP Parameter Contamination | Shritam Bhowmick
https://pwntoken.wordpress.com/2014/12/08/shritam-bhowmick-explains-http-parameter-contamination
Web Application Centric Security Research Blog. Cut the lips, utter the truth. The default about page! Shritam Bhowmick Explains HTTP Parameter Contamination. December 8, 2014. December 18, 2014. By Shritam Bhowmick Web Application Penetration Tester LinkedIn: https:/ www.linkedin.com/profile/view? Id=281014248&trk=nav responsive tab profile. Academia: https:/ independent.academia.edu/ShritamBhowmick. Facebook: https:/ www.facebook.com/coded32. Earlier on my previous post about Enterprise HTTP Security.
pwntoken.github.io
Portfolio - Pwntoken - Digital Security Research
http://pwntoken.github.io/portfolio
Pwntoken - Digital Security Research. Information Security Sciences with Shritam Bhowmick. To the mind that is still, the whole world surrenders. 2011 - 2012 (1 Year). Web Application Penetration Tester. Web Application Security Trainer. Defencely Cloud Security Pvt. Ltd. Web Application Security Specialist. Technical Specialist and SPOC @Application Security. Defence Contractor @Information Security, Director - Technical. My Professional sample work items could be accessed here. Etc, more chilled dishes .
SOCIAL ENGAGEMENT