PinnedRise of Broken Access ControlWhy authorization flaws are trendy and easier to discoverNov 30, 20231Nov 30, 20231
Social Engineering: The Art of Psychological Exploitation (Part-5)Defending Against Social Engineering AttacksMar 31Mar 31
Social Engineering: The Art of Psychological Exploitation (Part-4)Notable social engineering crimes and case studiesMar 3Mar 3
Social Engineering: The Art of Psychological Exploitation (Part-3)AI-driven social engineering attacks that are emerging in real-lifeFeb 17Feb 17
Social Engineering: The Art of Psychological Exploitation (Part-2)How do different website phishing attack worksFeb 16Feb 16
Social Engineering: The Art of Psychological Exploitation (Part-1)Introduction and classification of Social EngineeringFeb 13Feb 13
Ultimate Guide to OWASP Top 10:2021How common web security bugs can be exploited and preventedApr 7, 2024Apr 7, 2024
Demystifying Password Cracking: Attacks and Defence StrategiesHow passwords can get hacked and ways to stop themJan 16, 2024Jan 16, 2024