Searching vulnerabilities on the host (the host can be a website, web server, network device (router and others), end-user computer) begins with...
In this tutorial, the specialists of the Cyber Security 360 course of the International Institute of Cyber Security (IICS) will show us...
Applied Programming Interfaces (API) are an essential component of most modern programs and applications. In fact, cloud applications and mobile applications now...
Today, the specialists of the Cyber Security 360 course of the International Institute of Cyber Security (IICS) will show us in detail...
Searching for vulnerabilities in websites, tools, applications, and software for reporting through bounty programs is a common practice among programmers. Although this...
Privilege escalation attacks pose a severe cyber security risk to all kinds of systems in public and private organizations. In these attacks,...
Since its appearance, deepfake technology has become a controversial issue because, despite being one of the most popular examples of artificial intelligence...
A web application firewall (WAF) is a program designed to analyze incoming requests to a web server and, according to the rules...
The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the...
In cybersecurity, steganography is a technique that allows you to hide snippets of code in a legitimate-looking file, mainly images in various...
Phishing is one of the main cybersecurity threats today, since virtually anyone in the world uses smartphones, online accounts and other tools...
Search engines are one of the most widely used computer tools worldwide, since any user can access the Internet regardless of their...
Mobile hacking is one of the most dangerous cybercriminal trends, as it allows threat actors to conduct detailed surveillance of people of...
Kubernetes is a great platform for container management that has shown a breakthrough lately, both in terms of functionality and in terms...
The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds...
Although some users still ignore it, it is a known fact that Windows systems store information about user logins locally for cases...
The Internet of Things (IoT) is probably one of the most widely used technological concepts in recent times, as it has implementations...