Tag: Security

  • SQL Injection

    SQL Injection

    SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

  • Globe

    Recon-ng v5 Tutorial

    Recon-ng v5 is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience.

  • Browser Privacy

    Browser Privacy, Security and Tracking test sites

    A list of sites to test your browser privacy, security and tracking.

  • MASSCAN

    MASSCAN – Mass IP port scanner

    MASSCAN – Mass IP port scanner is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a single machine.

  • DNS DoH DoT

    Privacy and Security Focused DNS Resolver

    The DNS over HTTPS protocol uses a domain name entered by a user in its browser and sends a query to a DNS server to determine the numeric IP address of the web server hosting that particular site.

  • Does your business have a Well-Known URL for changing passwords? It should!

    Unfortunately, that’s still something of a nuisance to even security-conscious users, as they may find it time-consuming or simply too much …

  • Firms Splurge on Security and Staff During Pandemic

    A majority of global organizations have been spending more on cybersecurity and compliance during the pandemic, whilst also reporting …

  • Wikipedia Investigates DDoS Attack

    Cybercrime , DDoS Protection , Fraud Management & Cybercrime Wikipedia Investigates DDoS Attack Sites in Europe, Middle East Affected Over …

  • U.S. Rep Lieu hopeful for election security bill prospects

    U.S. Representative Ted Lieu (D-CA) thinks that Senate Majority Leader Mitch McConnell’s weakening opposition to gun legislation bodes …

  • Analysis of end-user cybersecurity training reveals security gaps

    Users knew the least about spotting phishing, protecting data, cybersecurity compliance, and mobile device protection. …

  • Will XDR Improve Security?

    Cybercriminals and malicious hackers have been shifting their tactics, techniques, and procedures (TTPs) to improve their ability to …