Cybersecurity

11 Results / Page 1 of 2

Background
Malware artifact/IOC

today

close

Cybersecurity + Defense + blog + SOC Z. Oualid

What are malware artifacts ?

In the intricate landscape of cybersecurity, understanding the concept of malware artifacts is paramount for safeguarding digital environments. All malwares has their own digitale signature that is represented by their artifacts, that can be used to detect them in infected machines. So, what are malware artifacts? Malware artifacts are traces ...

CVE check

today

close

blog + Cybersecurity + Defense Z. Oualid

Do all vulnerabilities have CVE?

CVE is a very popular word in the cyber security industry. If you take any penetration test or any vulnerability assessment report, you will find a bunch of CVEs for every asset. However, does this means that all the vulnerabilities have a CVE? According to the vulnDB database of discovered ...

common API vulnerabilities

today

close

Cybersecurity + blog Z. Oualid

10 most common API security attacks

APIs are the new most popular way to make complex and scalable web applications. According to the community forum programmableweb.com in 2015 they have listed 12,000 APIs in their directory, and in early 2019 they discovered that the number has gone to nearly 22,000, which prove the rapid growth in ...

GDPR meaning

today

close

Cybersecurity + Laws + blog Z. Oualid

GDPR meaning and compliance steps

If you have a website or you are thinking about starting one, then you have definitely heard about the GDPR and you also heard that you will need to comply with it. So what is the meaning of GDPR? GDPR “The General Data Protection Regulation” is a European regulation for ...