Kashaf RafiqueDemystifying Cybersecurity and Information Security: Exploring the CNSS Security Model and MoreIn today’s interconnected world, the importance of cybersecurity and information security cannot be overstated. From safeguarding sensitive…Sep 19, 2023
Amit VermaWeb Armor: Ensuring the Security of Your Web ApplicationsSafeguarding Your Web Applications in an Evolving Threat LandscapeMay 12May 12
Ümmü Gülsüm VarlıCLICKJACKINGClickjacking is an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another. Its…Aug 12, 2023Aug 12, 2023
Dolly AswinMost Common Web Application Security RisksThere are no silver bullets when it comes to implementing security. However, there are proven principles and practices we can use to secureNov 30, 2023Nov 30, 2023
Kashaf RafiqueDemystifying Cybersecurity and Information Security: Exploring the CNSS Security Model and MoreIn today’s interconnected world, the importance of cybersecurity and information security cannot be overstated. From safeguarding sensitive…Sep 19, 2023
Amit VermaWeb Armor: Ensuring the Security of Your Web ApplicationsSafeguarding Your Web Applications in an Evolving Threat LandscapeMay 12
Ümmü Gülsüm VarlıCLICKJACKINGClickjacking is an attack that fools users into thinking they are clicking on one thing when they are actually clicking on another. Its…Aug 12, 2023
Dolly AswinMost Common Web Application Security RisksThere are no silver bullets when it comes to implementing security. However, there are proven principles and practices we can use to secureNov 30, 2023
InSimform EngineeringbyArkitUnderstanding the DOS and DDOS attacksInsights about the working of DOS and DDOS attacks.Mar 30, 2023
InAI AdvancesbyMina GhashamiThe Art of Adversarial AttacksUnmasking the Vulnerabilities of Large Language ModelsSep 26, 2023
Pawel GielmudaMeltdown & Spectre AttackOne of the most disturbing vulnerabilities in EmbeddedSystems is the MeltdownSpectre attack. The main risk is that it affects most modern…May 31, 2023