© 2023 Hashnode
#infosec-cjbi6apo9015yaywu2micx2eo
Botnets are an invisible threat that can wreak havoc on your computer system, stealing your data, and compromising your security. A botnet is a network of computers that have been infected with malwar…
SQL injection Bypassing through ' OR True # Securing web applications - using methods given by the framework or libraries you are utilizing for development. There are often opinionated way provided to use user input inside a SQL query to g…
Imagine you are a bouncer at a fancy nightclub, responsible for keeping out unwanted guests while allowing in only those who are on the guest list. Your job is to make sure everyone who enters the clu…
If you use an email long enough, you know how much spam that email will get - some even pass through the filter and reach your inbox. When this happens, you can do three things: Add filtering to dele…
Introduction Phishing attacks have become a common occurrence since the Internet was introduced in the 1990s. While phishing attacks intrude on victims' private information, people can protect themsel…
Today's network architecture is complex and is faced with a threat environment that is constantly changing, and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilit…
Safer Internet Day (SID) is a global campaign celebrated annually in February to raise awareness of the importance of staying safe online. The internet is a global network where a variety of information and communication facilities are made…
To protect any organization's assets, the first step is to identify and keep an inventory of all its public-facing websites, web applications, and APIs. One of the ways to track this is by extracting …
Lately, the information security space seems to be overwhelmed by an influx of new tools and advancements due to AI, especially ChatGPT, which is taking over all news headlines. The certification indu…
STRIDE and PASTA are like two superhuman frameworks that assist with protecting your digital world from bad guys. They cooperate to distinguish and order expected threats and ensure that you are gener…