Ridham TripathiSOME OF TOP UNIVERSITIES WOULDN’T PASS CYBERSECURITY EXAM: LEFT WEBSITES VULNERABLECyberNews researchers discovered that many universities worldwide are leaking sensitive information and are even open to full takeover.Oct 16, 2023Oct 16, 2023
Ridham Tripathi7 Types of Security Operation Centers (SOC)What is a Security Operation Center?Apr 12, 2023Apr 12, 2023
Ridham TripathiWhat is Privilege Escalation ?There are multiple ways to achieve this such as by modifying user, directly accessing URL. Ultimate goal of attacker is to access…Jan 18, 2023Jan 18, 2023
Ridham TripathiPassword Spraying AttackWhen it comes to password hacking, most organizations are quite familiar with brute force attacks, where cybercriminals continually guess…Jan 3, 2023Jan 3, 2023
Ridham TripathiThe top 5 Pentesting tools you will ever need [ updated 2021]A penetration test or “ pentest” is a human-driven assessment of an organization’s security. One or more pentesters will be engaged by an…Aug 21, 2021Aug 21, 2021
Ridham TripathiCyber Security Essay for Students and ChildrenCyber Security EssayAug 18, 2021Aug 18, 2021
Ridham Tripathi5 Reasons why you should learn Ethical HackingWhen it comes to hacking , surely you might think of a man who is busy with codes on big machines in a dark room and surrounded by bulky…Aug 12, 2021Aug 12, 2021
Ridham TripathiBest Cyber Security Books You Must Add to Your BookshelfIntroductionAug 11, 2021Aug 11, 2021