Hirunima SenarathnaCSRF — Cross Site Request Forgery AttackIt is obvious and a proven fact that almost every person;either a college student, employee or a pentioner gets involve in internet in…2 min read·Mar 27, 2024----
Hirunima SenarathnaOWASP Top 10 VulnerabilitiesThe OWASP (Open Web Application Security Project) is a non-profit organization that was founded in 2001 to help web owners protect their…3 min read·Feb 11, 2024----
Hirunima SenarathnaCyber Kill ChainThe cyber kill chain, which was developed in 2011 by Lockheed Martin based on a military model, is an organized method for comprehending a…3 min read·Jan 31, 2024----
Hirunima SenarathnaUse of AI in Cyber security related toolsDetecting and preventing attacks — AI algorithms can analyze large amounts of data to detect patterns and anomalies that indicate a cyber…4 min read·Jan 18, 2024----
Hirunima SenarathnaISO 27001Iso 27001 simply is a standard for Information Security Management Systems(ISMS). It provides a systematic approach for organizations to…3 min read·Oct 6, 2023----
Hirunima SenarathnaComputer processes have children!!!What? YES, you read it correctly. They create not only child processes but also they become zombies or orphans too. The process that…2 min read·Aug 25, 2023----