We created this privacy statement in order to demonstrate our commitment to privacy and security and to clearly define these standards to our website visitors. This privacy policy notice applies solely to information collected by this website.
The following discloses our information gathering and dissemination practices for this website:
Please note: if you communicate with us through this site, it is possible that your communication may not be treated as privileged or confidential. If you communicate with us through this site in a matter or condition for which we already represent or treat you, please remember that Internet e-mail and contact forms are not secure by nature and you should avoid sending sensitive or confidential Internet messages.
Information sharing
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information provided by consumers. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing consumers, so long as those parties agree to keep this information confidential. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety. However, we may share aggregated demographic information with our partners that do not contain personally identifiable information.
Security
This site has security measures in place to protect the loss, misuse and alteration of the information under our control. We store all user information in databases protected via a variety of access controls as well as being physically located in a secure facility. This data is accessed only for the purposes specified in this privacy statement.
Choice/Opt-Out
You can opt out of receiving future communications from us. You may also request to see any information about you that we have stored, and you may request that we delete any of this information. Please see below for how to contact us.
Website Usage Disclaimers
Our company is responsible for the content of this website. This website is designed for general informational purposes only and it does not constitute legal or medical advice nor the formation of a lawyer-client or doctor-client relationship.
How to Contact Us
If you have any questions about this privacy statement, the practices of this site, or your dealings with this Web site, please visit our contact page.
Vagari.ai LLC has created a Vehicle Rental App for Auto Dealers, Fleet and other vehicle owners (Owners) to provide vehicles to drivers including those who drive for uber/lyft (Renters) in the rideshare and Transportation as a Service (TaaS) industry. Vagari.ai LLC is a frictionless mobility technology startup based in New York, USA. Their first product is the vehicle rental mobile app. This App offers an opportunity for Owners to earn incremental revenue on idle inventory on one hand and for the Renters to use vehicles at subscription price and if needed be able to purchase it over a period of time.
Some of the vulnerabilities pop out during our pentest in vagari are
We pinpoint potential avenues of network attack where access might be gained through internet-connected servers or network equipment by individuals outside of Vagari which lack appropriate rights or credentials.
We then conducted a mock attack to test security controls, developing and presenting with a cybersecurity assessment on findings along with solutions and recommendations that vagari can use to remediate the issue.
Trusted Hands Financial Services Private limited is a Kerala based Activities auxiliary to financial intermediation company. A consumer-focused financial services & tech platform that solves problem of discovery, shortlisting, application, management and servicing of bank loans, borrowing options. Trusted Hands Financial Services (THFS) will change the way customers take and manage loans. THFS will enable customers to acquire their financial freedom, with right choice at the right time.
Requirement : Internal / External Pentesting, Vulnerability Assesmement, Solution
The Customer needed to test the security controls deployed within their IT infrastructure.
Offenselogic team conducted black box penetration testing of the external perimeter of the Customer’s network. The ethical hackers didn’t manage to penetrate the network with no credentials, so they proceeded with the grey box testing method using user login details but having no access to the entire network. Grey box penetration testing revealed a vulnerability of the Customer’s remote server to external manipulations.
Our security engineers scanned the Customer’s internal network for vulnerabilities and exploited the discovered vulnerabilities using the grey box penetration testing method. They discovered a server using the obsolete HTTPS protocol, which was critical for the banking environment storing clients’ data.
The Customer received detailed reports of the conducted network vulnerability assessment, penetration testing, and the security risk assessment of the client digital channels with recommendations to mitigate the discovered vulnerabilities. After fixing all the issues according to the provided remediation plan, the Customer ran retesting, which showed the increased security level of the network’s external perimeter and internal environment.
"*" indicates required fields