PinnedSai SamarthOverview of Top Mobile Security Threats in 2023The advent of mobile technology has revolutionized the way we communicate, work, and conduct business. However, as mobile devices become…3 min read·Dec 31, 2023----
PinnedSai SamarthThe Security Myth: Unravelling Misconceptions in Today’s Digital LandscapeIn today’s rapidly evolving digital landscape, the term ‘security’ has taken on numerous dimensions, often leading to misconceptions and…2 min read·Dec 30, 2023----
PinnedSai SamarthinSystem WeaknessOSINT Framework: Collections of Open Source Intelligence ToolsetsIntroduction4 min read·Jul 27, 2023----
PinnedSai SamarthOverview of Top Mobile Security Threats in 2022Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical…4 min read·Jun 30, 2022----
Sai SamarthinSystem WeaknessRaspberry Pi Network Vulnerability Scanner OpenVas!OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated and authenticated testing, various high-level…4 min read·May 8, 2022----
Sai SamarthinSystem WeaknessTools For Linux System AdministratorThe security tools listed in this article span a wide range — from network security tools to intrusion detection and prevention systems.4 min read·Mar 22, 2022----
Sai SamarthCertification in Cybersecurity!Cybersecurity deals with the protection/security of internet-connected systems and devices such as the hardware, software, databases, etc…25 min read·Mar 8, 2022----
Sai SamarthThe World’s First Digital War has just begun! — must read.In the first three days of the war alone, the number of cyberattacks on Ukraine’s political and military institutions increased by 196…14 min read·Mar 7, 2022----
Sai SamarthTop 5 Simple Topics for Beginners in Cybersecurity (2022)What are simple topics for beginners to learn for cybersecurity in 2022? To answer this question, I will be discussing with you 4 simple…3 min read·Mar 7, 2022----