Ahmed_SalemThe Menace of Email SpoofingIn the world of emails, there’s a sneaky trickster called email spoofing. It’s like a digital disguise, making cyber mischief by pretending…Dec 5, 2023Dec 5, 2023
Ahmed_SalemExploring the Types of Web Application AttacksWeb applications have become an integral part of our daily lives, powering everything from e-commerce websites to social media platforms…Oct 23, 2023Oct 23, 2023
Ahmed_SalemList Of The Newly Discovered Zero-Day AttacksWHAT IS A ZERO-DAY EXPLOIT?Oct 18, 2023Oct 18, 2023
Ahmed_SalemUnderstanding the Differences Between CVE, CWE, and NVD.In the world of cybersecurity, acronyms abound, and it’s easy to get confused about what each one represents. Three commonly used terms are…Oct 9, 2023Oct 9, 2023
Ahmed_SalemThe SANS TOP 25 Dangerous Software Errors You Need to KnowCybersecurity matters now more than ever, and staying informed is your first line of defense. The SANS TOP 25 Software Errors list is a…Oct 9, 2023Oct 9, 2023
Ahmed_SalemWeek 2 of Senselearner Tech TasksDifference between Footprinting and Reconnaissance.Sep 26, 2023Sep 26, 2023
Ahmed_SalemWeek 1 of Senselearner Tech TasksPart1 The Crucial Importance of CybersecuritySep 17, 2023Sep 17, 2023
Ahmed_SalemAmateursCTF 2023 | OSINT | GitintWelcome to my first CTF write-up and it will be one of many ISA ! In this article, I’ll be sharing my experience participating in a…Jul 20, 2023Jul 20, 2023