
SQL INJECTION ATTACK PREVENTION IN PHP | CODE EXAMPLES
After several years of penetration testing and working with development teams to secure their systems, I have noticed that there was no complete blog post that gives a detailed explanation ...
After several years of penetration testing and working with development teams to secure their systems, I have noticed that there was no complete blog post that gives a detailed explanation ...
If you have a website or you are thinking about starting one, then you have definitely heard about the GDPR and you also heard that you will need to comply ...
if you work in the cybersecurity field or at least you have a website that you manage, then you have definitely heard about some DDOS attacks, so what is a ...
Due to the increase of the cyberattack around the glob, many companies have started to implement what we call the Two factor authentication or multifactor authentication system. Two factor authentication ...
Before we start talking about this concept I’d like to talk a little bit about the history of the word red team. According to Micah Zenko book “Red Team How ...
Hi everyone I hope you are doing well and safe … This is my first blog post and I really want to dedicate it to a question that many people ...