cyber security

  1. x32x01

    Types of Cyber-Attacks

  2. x32x01

    10 Popular CyberSecurity Certifications

  3. x32x01

    Online Cyber Security Training

    Online Cyber Security Training : # PortSwigger Labs : # TryHackMe Roadmap : #...
  4. x32x01

    Is AI The Future of Cyber Security ?

    Cybersecurity issues have become a big threat to every company. Businesses will fall victim to a ransomware attack every 11 seconds by 2021. Also, the global ransomware damage costs are predicted to hit $20 billion by 2021. Companies are looking for different ways to prevent themselves from...
  5. x32x01

    List Of 100+ Cyber Security RSS Feeds

    RSS is a type of web feed which allows users and applications to access updates to websites in a standardized, computer-readable format. These feeds can, for example, allow a user to keep track of many different websites in a single news aggregator. Here we’ve listed out top 100+ RSS Feeds in...
  6. x32x01

    Cyber Security & Penetration Testing Multiple Choice Questions

    1. A process is nothing but a running instance of a program. True or False? a. True b. False 2. Which of the following Linux commands is used to check files opened by current user? a. crontab b. ls -l c. lsof d. dir 3. Which of the following files in Linux is used to store account passwords...
  7. x32x01

    Myths About Cyber-Security ... !!

  8. x32x01

    Types of Cyber Attacks

  9. x32x01

    Best TV Shows On Hacking & Technology

  10. x32x01

    Get Hidden Data From Images and How to Remove/Edit Personal Information From Photo

    Images contains valuable personal useful data in images metadata. In this digital forensic tutorial we are going to learn how we can get location and other useful information from a image file and how to change them. In this digitalised world we usually share photos online. We share our images...
  11. x32x01

    Modlishka - Advanced Phishing | Bypass Two Factor Authentication

    We all try to secure our all online accounts and social media accounts and we turn on the Two-Factor Authentication or Two-Step Verification. Then we think that we are now safe. Sometimes we check a phishing page with wrong password. But Modlishka can bypass Two-factor authentication (2FA)...
  12. x32x01

    Maltego - Powerful OSINT Reconnaissance Framework

    Maltego is one of the most famous OSINT frameworks for personal and organizational reconnaissance. It is a GUI tool that provides the capability of gathering information on any individuals, by extracting the information that is publicly available on the internet by diffrent methods. Maltego is...
  13. x32x01

    Configuring The ProxyChains

    Sometimes we need to remain untraceable while performing a penetration testing activity. Proxychains helps us by allowing us to use an intermediary system whose IP can be left in the logs of the system without worry of it tracing back to us. Proxychains is a tool that allows any application to...
  14. x32x01

    The Cybersecurity Behind Live Casinos

    Cybersecurity plays an essential role in every sector of any financial institution. But here we are specially talking about live casinos. The live casinos are 100% legal and safe as their cybersecurity is highly protective. Due to their day to day huge transactions, they spent a large amount...
  15. x32x01

    Beware of Cyber-Attacks: Protect Small Business with 7 Proven Cybersecurity Strategies

    2020 has been a rough year to both humankind and economic growth. However, a cybercrime would make it the worst, if you neglect your business’s cybersecurity measures. When you haven’t missed a single inch in achieving online presence over the internet, then there are enough chances that...
  16. x32x01

    Ncrack - Crack Network Credentials in Minutes

    Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords. Security professionals also rely on Ncrack when auditing their clients. Ncrack comes pre-installed...
  17. x32x01

    Pixie Dust Attack - Crack Wireless Routers [Easy Guide]

    Wi-Fi Protected Setup (WPS) was introduced in 2006 by Cisco for home users who wanted to connect their home network without the trouble of remembering hard passwords for the WiFi. It used an eight digit PIN to authenticate a client to the network (by PIN/Push Button/USB/Near-field communication...
  18. x32x01

    15 Best Laptops For Kali Linux & Cyber Security in 2021 - Check This Before Buy

    Best Laptop For Kali Linux Laptops for Kali Linux are not exactly like other normal laptops. We are considering to buy a laptop for Kali Linux it should help in penetration testing and programming works. As we all know Kali is a powerful Debian based Linux distribution so it doesn't need so...
  19. x32x01

    Canarytokens - Danger For Attackers

    Canarytokens are one type of customisable unique links that someone click or access this links we can get many information of target like the IP, location, browser, target is using tor or not and many more information. The main use of canarytokens is track malicious activity on our own network...
  20. x32x01

    Ghost Framework - Control Android Devices Remotely

    Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control Android device. Ghost Framework 7.0 gives us the power and convenience of remote Android device administration. We can use this framework to control old Android devices...