Edit Content

blog

How to Detect and Respond to Web Application Attacks

How to Detect and Respond to Web Application Attacks written by Shuvamoy Roy on 08/12/22 Table of Content Monitor your web applications for unusual or suspicious activity Monitor your web applications for unusual or suspicious activity Disabling or limiting access to vulnerable features Implementing countermeasures Monitor your web application logs Use security tools and services …

How to Detect and Respond to Web Application Attacks Read More »

dark, people, man-2571846.jpg

MOBILE DATA SECURITY

MOBILE DATA SECURITY written by Divya Chaudhari on 28/08/21 Table of Content How to secure mobile devices and data in it? 1. Use Strong/Passwords 2. Using protected wi-fi 3. Using VPNs 4. Encrypting the device 5. Using an Antivirus software Other Important measures Conclusion MOBILE DATA SECURITY Trending MOBILE DATA SECURITY Increased need of cyber …

MOBILE DATA SECURITY Read More »

Increased need of cyber security professionals

Increased need of cyber security professionals written by Chinmay and Karan on 30/08/21 Table of Content What does a cyber security professional do? How do I become a cyber security professional? Increased need of cyber security professional Increased need of cyber security professionals Trending Increased need of cyber security professionals DEEP DIVE INTO SOCIAL ENGINEERING …

Increased need of cyber security professionals Read More »

ransomware, cyber crime, malware-2320941.jpg

Ransomware attack-Biggest online threat

Ransomware attack-Biggest online threat written by Nishmi and Karan on 08/07/21 Table of Content What is ransomware attack First occurrence Types of Ransomware Security Vulnerabilities How to Protect Yourself?     Ransomware attack-Biggest online threat Trending DEEP DIVE INTO SOCIAL ENGINEERING ATTACKS | PART 2 DEEP DIVE INTO SOCIAL ENGINEERING ATTACKS | PART 1 Ransomware …

Ransomware attack-Biggest online threat Read More »

window, hand, magnifying glass-1231894.jpg

Best Operating Systems for Pentesting and Ethical Hacking

Best Operating Systems for Pentesting and Ethical Hacking written by ‘authorname’ on ‘date’ Table of Content 1: Kali Linux 2: Parrot Security OS 3: BackBox 4: BlackArch 5: DEFT Linux 6: Fedora Security Lab 7: Overview of tools Best Operating Systems for Pentesting and Ethical Hacking Trending TOP 6 CYBER SECURITY JOBS IN DEMAND Best …

Best Operating Systems for Pentesting and Ethical Hacking Read More »