In continuation of our interview series, here we are presenting the 4th part in our interview series. Let’s begin: Q1. How firewall can aid in malware mitigation? An enterprise firewall between your internal network and the Internet provides one layer of protection for the internal computers. However, not all threats come through the “front door” […]
In this article we are going to see about spoofing. What is Difference between spoofing and phishing and lot more stuff
In this article we are going to talk about IoT security and penetration testing
In this article you are going to learn about top 5 extensions in burp suite which are really helpful in bug bounty hunting. These extensions are not only helpful in bug bounty hunting, but you can also use these extension during your normal penetration testing sessions. Before staring the list the below section is for […]
In this article we are going to talk about Red Team, Blue Team and Purple Team. What are they? and How they Works?
In this article we are going discuss about Encoding vs Encryption vs Hashing.
In this article we are going to see about Man In the middle attack and types of MITM attacks
In this article we are going to see about what is Nmap and What are NSE scripts and how they work together.
In this article we are going to discuss about top cybersecurity certifications in 2021
In this article we’re going to see about steganography and solve a stego challenge.