Charitha JeewankaTransaction Management with Java ORMTransaction management is a fundamental aspect of any data persistence operation. Understanding transaction concepts, boundaries, and…May 27May 27
Charitha JeewankaMimicking, Detecting and Mitigating DCShadow AttacksA DCshadow attack is a type of attack categorized under Rogue Domain Controller(DC) technique in the MITRE ATT&CK framework (ID: T1207). A…Mar 8Mar 8
Charitha JeewankaUnderstanding Pass-the-Cookie Attacks: Strengthening Security with MFA Layered ProtectionEver feel like online security is a never-ending maze? You’re not alone! In today’s digital world, protecting your accounts from…Feb 17Feb 17
Charitha JeewankaEmbracing Security in the Digital Era: A Deep Dive into Zero Trust Network Access (ZTNA)In today’s dynamic cybersecurity landscape, traditional security models are being challenged by the evolution of cloud services and the…Feb 2Feb 2
Charitha JeewankaGetting on with KubernetesKubernetes is a container orchestration platform that automates the deployment, scaling, and management of containerized applications…Jan 28Jan 28