A web application firewall (WAF) is a program designed to analyze incoming requests to a web server and, according to the rules...
The cybersecurity community understands as cyber forensics the procedures and methodological techniques to identify, collect, preserve, extract, interpret, document and present the...
In cybersecurity, steganography is a technique that allows you to hide snippets of code in a legitimate-looking file, mainly images in various...
Phishing is one of the main cybersecurity threats today, since virtually anyone in the world uses smartphones, online accounts and other tools...
Search engines are one of the most widely used computer tools worldwide, since any user can access the Internet regardless of their...
Mobile hacking is one of the most dangerous cybercriminal trends, as it allows threat actors to conduct detailed surveillance of people of...
Kubernetes is a great platform for container management that has shown a breakthrough lately, both in terms of functionality and in terms...
The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds...
Although some users still ignore it, it is a known fact that Windows systems store information about user logins locally for cases...
The Internet of Things (IoT) is probably one of the most widely used technological concepts in recent times, as it has implementations...
Digital forensics is one of the most important elements of ethical hacking, as it allows researchers to learn as much as possible...
Cross-site scripting (XSS) attacks are a variant of code injection that involves the use of specially crafted scripts on legitimate websites for...
The automatic analysis of potential security flaws has become one of the essential tasks for developers, researchers and experts in vulnerability assessment,...
System logs analysis is one of the most useful hacking tasks for researchers and specialists in digital forensics and reverse engineering, so...
Gathering cookies is a popular hacking activity and can prove really useful for obtaining information from a target, so it is necessary...
Password cracking for WiFi networks is one of the hacking activities that most interest beginner researchers, cybersecurity experts and sporadic users alike...
One of the main variants of attack against Windows systems is the abuse of Active Directory using tools for credential theft such...