PinnedSQL Injection: Beginner’s guideUse cases to understand SQLi better Use-case 1: Bypassing a LoginSep 3, 2024Sep 3, 2024
Introduction to SIEM and SOARCost-efficiency by reducing the financial impact of security breaches, which can average $3.4 million per incidentFeb 8, 2024Feb 8, 2024
IT Risk Assessment : A beginner’s guideRisk rankings: According to a template in “NIST guide for conducting risk assessments”, the severity of following categories have to be…Jan 22, 2024Jan 22, 2024
Threat Modelling and STRIDE methodologySTRIDE, an acronym representing Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege…Jan 19, 2024Jan 19, 2024
Social Engineering 101: Navigating the EssentialsPhishing is the deceptive practice of sending communications across multiple channels, such as social media, text messages, and phone…Jan 18, 2024Jan 18, 2024
NZISM and Zero Trust PolicyIn a Zero Trust environment, the mantra is “never trust, always verify.” This approach mandates continuous verification of the identity andJan 17, 2024Jan 17, 2024