Why you should STOP using SMS for multi-factor authentication
SMS for multi-factor authentication (MFA) is an awesome and easy method to add one more layer of security. As cyber...
SMS for multi-factor authentication (MFA) is an awesome and easy method to add one more layer of security. As cyber...
Open Source Intelligence (OSINT) is not a unknown term for most of the people who have a interest in technology....
PimEyes is a great OSINT tool for Reverse Image Search & Facial Recognition available on the internet. In simple words,...
OSINT stands for Open Source Intelligence which is used for getting information available in the public domain related to the...
OWASP is a non-profit organization that publishes the Top 10 category of vulnerability types of web applications. This blog list...
Firmware Analysis and Comparison Tool (FACT) is an automation toolkit to analyze binaries of IoT devices, network devices, drones, UEFI,...
readelf command is used to analyze binaries based on Linux. This is most common tool used by security professionals to...
Whenever you engage in the security assessment of Windows-based targets, password cracking is one of the activities that need to...
A month ago I was listening to one podcast where they used the term ‘metaverse’. Although I have listened to...
Executable and Linkable Format (ELF) is a default format on Linux based system. It defines the structure of binary files...
This blog comes in a form of a web story that illustrates the Top 15 NMap Commands used by Security...
Log4j vulnerability (also called Log4shell) is a critical issue that has been discovered in popular logging package 4j on 9th...
The File system is used to control how data is stored and retrieved. Each file served a specific purpose. Remember...
This blog list out Side-Channel Attack Interview Questions. A side-Channel attack is still in much of the research phase. But...