Hirunima SenarathnaCSRF — Cross Site Request Forgery AttackIt is obvious and a proven fact that almost every person;either a college student, employee or a pentioner gets involve in internet in…Mar 271Mar 271
Hirunima SenarathnaOWASP Top 10 VulnerabilitiesThe OWASP (Open Web Application Security Project) is a non-profit organization that was founded in 2001 to help web owners protect their…Feb 11Feb 11
Hirunima SenarathnaCyber Kill ChainThe cyber kill chain, which was developed in 2011 by Lockheed Martin based on a military model, is an organized method for comprehending a…Jan 31Jan 31
Hirunima SenarathnaUse of AI in Cyber security related toolsDetecting and preventing attacks — AI algorithms can analyze large amounts of data to detect patterns and anomalies that indicate a cyber…Jan 18Jan 18
Hirunima SenarathnaISO 27001Iso 27001 simply is a standard for Information Security Management Systems(ISMS). It provides a systematic approach for organizations to…Oct 6, 2023Oct 6, 2023
Hirunima SenarathnaComputer processes have children!!!What? YES, you read it correctly. They create not only child processes but also they become zombies or orphans too. The process that…Aug 25, 2023Aug 25, 2023