PinnedOverview of Top Mobile Security Threats in 2023The advent of mobile technology has revolutionized the way we communicate, work, and conduct business. However, as mobile devices become…Dec 31, 2023Dec 31, 2023
PinnedThe Security Myth: Unravelling Misconceptions in Today’s Digital LandscapeIn today’s rapidly evolving digital landscape, the term ‘security’ has taken on numerous dimensions, often leading to misconceptions and…Dec 30, 2023Dec 30, 2023
PinnedPublished inSystem WeaknessOSINT Framework: Collections of Open Source Intelligence ToolsetsIntroductionJul 27, 2023Jul 27, 2023
PinnedOverview of Top Mobile Security Threats in 2022Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical…Jun 30, 2022Jun 30, 2022
Published inSystem WeaknessRaspberry Pi Network Vulnerability Scanner OpenVas!OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level…May 8, 2022May 8, 2022
Published inSystem WeaknessTools For Linux System AdministratorThe security tools listed in this article span a wide range — from network security tools to intrusion detection and prevention systems.Mar 22, 2022Mar 22, 2022
Certification in Cybersecurity!Cybersecurity deals with the protection/security of internet-connected systems and devices such as the hardware, software, databases, etc…Mar 8, 2022Mar 8, 2022
The World’s First Digital War has just begun! — must read.In the first three days of the war alone, the number of cyberattacks on Ukraine’s political and military institutions increased by 196…Mar 7, 2022Mar 7, 2022
Top 5 Simple Topics for Beginners in Cybersecurity (2022)What are simple topics for beginners to learn for cybersecurity in 2022? To answer this question, I will be discussing with you 4 simple…Mar 7, 2022Mar 7, 2022