CALL US

+91 9116117170

Category: Latest Vulnerabilities

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Annu Choudhari 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

How to Exploit a Network Service through Buffer Overflow

By Chandan Singh 0 Comment October 6, 2018

We had a great time exploiting the vulnerabilities of the buffer overflow of Protostar virtual machine, but now it’s time to move on and search for more complex tasks. We had a great time exploiting the vulnerabilities of the Protostar virtual machine , but now it’s time to move on and search for more complex tasks. And such […]

How to Hack the Website | Types of Hacking and Protection from them

By Chandan Singh 0 Comment September 11, 2018

How to hack the site. Types of hacking and protection from them. Want to learn how to hack the website? Or vice versa, find out how you can protect yourself from hacking? Every day, there is a hacking of sites that are deleted or scammers require a ransom. As they say, the last one laughs […]

The fundamentals of cybersecurity: Goals and objectives of the course

By Palash Verma 0 Comment May 19, 2018

The development of the information society involves the introduction of information technologies in all spheres of life, but this also means the emergence of new threats to security – from information leaks to cyberterrorism. In the draft Concept of Cybersecurity Strategy of the Russian Federation, cyberspace is defined as “the field of activity in the information […]

Everything is under Threat | What is Meltdown and Specter and How to Live with them?

By Chandan Singh 0 Comment January 24, 2018

Everything is under Threat | What is Meltdown and Specter and How to Live with them? They say that the new is a well-forgotten old. The beginning of the year fully confirmed the validity of folk wisdom but in the worst sense of the possible. In fact, more recently, it became known about the two […]

error: Content is protected by Cyberops !!