A network intrusion attack is an unauthorised attack on a digital network that can occur in various ways. It often involves stealing valuable network resources and jeopardising the security of …
Tashina
Tashina
Tashina has been an avid cybersecurity writer for many years. She is passionate about cybersecurity and enjoys learning and writing about the latest trends, issues and challenges in the industry.
-
-
Organisations that prioritise security must keep vulnerability management as a top priority to establish a clear approach for identifying issues affecting their systems. Vulnerability scanning is a major component of …
-
Cross-site scripting (XSS) attacks continue to plague web applications as one of the most prevalent security vulnerabilities in the digital landscape. According to the OWASP Top 10, XSS consistently ranks …
-
What is Tailgating? Tailgating is a social engineering attack. In simple words, tailgating is when an unauthorised person gets access to a restricted area by following an authorised person. People …
-
What is Black Box Testing? In a black box text, the tester does not hold any information about internal working of a system. It is high-level testing that has a …
-
A social engineering assessment is a very important process to understand an organisation’s security exposure. As human beings tend to make errors and are considered the weakest link in any …
-
A build review evaluates the configuration of a device, operating system and its settings against certain industry standards. It plays an important role in creating a strong security posture for …
-
Do you ever connect your phone to the computer and get a notification that asks you whether you trust the device or not? Many of us may blindly click on …
-
Do you ever come across notifications and pop-ups asking you to update your software? I am sure you do. Most people try to avoid these updates and postpone them. However, …
-
A network vulnerability scan is a part of your vulnerability assessment process. The main focus lies in identifying security vulnerabilities in the systems that are hosted on particular IP addresses. …