Search
![Null Pointer Vulnerabilities](https://static.wixstatic.com/media/042008_d7e6272e906a4967b49be1ffa371ed18~mv2.png/v1/fill/w_366,h_275,fp_0.50_0.50,q_95,enc_auto/042008_d7e6272e906a4967b49be1ffa371ed18~mv2.png)
ninp0
- Jan 11, 2023
- 2 min
Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...
4 views0 comments
![Sub-Domain Hijacking: What Is It and How to Prevent It](https://static.wixstatic.com/media/042008_b9e8f2b4b46d43ca8831043ac6f27339~mv2.png/v1/fill/w_366,h_275,fp_0.50_0.50,q_95,enc_auto/042008_b9e8f2b4b46d43ca8831043ac6f27339~mv2.png)
ninp0
- Jan 10, 2023
- 3 min
Sub-Domain Hijacking: What Is It and How to Prevent It
Sub-domain hijacking is a type of cyber attack in which an attacker takes over a sub-domain of a legitimate website to gain control of...
6 views0 comments
![UAF Vulnerabilties](https://static.wixstatic.com/media/042008_8e971d62af5345a0af2adfdd5c6f20aa~mv2.png/v1/fill/w_366,h_275,fp_0.50_0.50,q_95,enc_auto/042008_8e971d62af5345a0af2adfdd5c6f20aa~mv2.png)
ninp0
- Jan 10, 2023
- 3 min
UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...
7 views0 comments
![Local File Inclusion Vulnerabilities (LFI)](https://static.wixstatic.com/media/042008_151f2e7bb4f345bcb13fb513951a1cb3~mv2.png/v1/fill/w_366,h_275,fp_0.50_0.50,q_95,enc_auto/042008_151f2e7bb4f345bcb13fb513951a1cb3~mv2.png)
ninp0
- Jan 10, 2023
- 3 min
Local File Inclusion Vulnerabilities (LFI)
Malicious Local File Include Vulnerabilities Local File Include (LFI) vulnerabilities are one of the most common and dangerous types of...
1 view0 comments
![Purple Team Testing: A Comprehensive Guide](https://static.wixstatic.com/media/042008_d7ad7fa65ecf47c39940a449dafecd75~mv2.png/v1/fill/w_366,h_275,fp_0.50_0.50,q_95,enc_auto/042008_d7ad7fa65ecf47c39940a449dafecd75~mv2.png)
ninp0
- Jan 10, 2023
- 3 min
Purple Team Testing: A Comprehensive Guide
Purple team testing is an increasingly popular security practice that combines the best aspects of both red and blue team testing. By...
10 views0 comments