Search

Lock Picking Village as a Team Building Activity
Team building is an important way for organizations to strengthen their relationships, strengthen bonds and build trust within the team....
ninp0
Dec 27, 20223 min read
7 views
0 comments

How AI is Changing Offensive Security
Introduction: In this blog post, we will explore how artificial intelligence (AI) and machine learning (ML) can be used to improve...
ninp0
Dec 26, 20222 min read
4 views
0 comments

Safe Cracking - The Art of Manipulation
Introduction Safe cracking is a skill that has been around for centuries. It is an art that requires a combination of knowledge, skill,...
ninp0
Dec 25, 20222 min read
7 views
0 comments

Fuzz Testing for Software Resiliency
1. Introduction to Fuzz Testing: What is it & What Benefits Does It Bring? Fuzz testing is a type of software testing that uses invalid,...
ninp0
Dec 25, 20222 min read
6 views
0 comments

DOM-Based Blind XSS
DOM-Based Blind XSS DOM-based Blind XSS (Document Object Model-based Blind Cross-Site Scripting) is one of the most dangerous and...
ninp0
Dec 25, 20222 min read
94 views
0 comments

Importance of DevSecOps in an Organization
Introduction DevSecOps is an important step to achieving the ultimate goal of any business – continual security and delivery excellence....
ninp0
Dec 24, 20223 min read
3 views
0 comments

Importance of SAST & DAST Security within Your Organization
Technology is a critical part of our everyday lives, and the need for robust security measures that safeguard digital assets has never...
ninp0
Dec 23, 20223 min read
4 views
0 comments

Introduction to Continuous Penetration Testing
We have all heard of mainstream cyber security practices such as firewalls and antivirus software. These are traditional security...
ninp0
Dec 22, 20222 min read
4 views
0 comments

Wardialing: Increase Telecommunication & Network Security with Proactive Testing
Page 1: Introduction to Wardialing Assessments When it comes to computer security, proactive monitoring and assessment should be one of...
ninp0
Dec 21, 20223 min read
7 views
0 comments

Smashing the Stack
Introduction Stack overflow vulnerabilities are a type of software security vulnerability that occurs when a program attempts to write...
ninp0
Dec 20, 20223 min read
1 view
0 comments

Format String Vulnerabilities
Format String Vulnerabilities Format string vulnerabilities are one of the most common security flaws in software applications. They...
ninp0
Dec 19, 20222 min read
1 view
0 comments

Integer Underflow Vulnerabilities
Integer Underflow Vulnerabilities Integer underflow vulnerabilities are a type of software vulnerability that can be exploited to cause a...
ninp0
Dec 18, 20222 min read
4 views
0 comments

Heap Overflows
Introduction Heap overflow vulnerabilities are a type of memory corruption vulnerability that occurs when a program allocates memory from...
ninp0
Dec 17, 20223 min read
8 views
0 comments

Integer Overflow Vulnerabilities
Integer Overflow Vulnerabilities Integer overflow vulnerabilities are a type of software vulnerability that can occur when a program does...
ninp0
Dec 16, 20222 min read
6 views
0 comments

Heap Spraying
Heap Spraying: An Overview Heap spraying is a method of exploiting computer software vulnerabilities which allows an attacker to execute...
ninp0
Dec 15, 20222 min read
2 views
0 comments

Web Cache Deception
Introduction Web cache deception is an increasingly common practice used by malicious actors to manipulate the content of a website and...
ninp0
Dec 14, 20223 min read
2 views
0 comments

How Threat Actors Bypass Multi-Factor Authentication
Introduction Multi-factor authentication (MFA) is a security system that requires more than one form of authentication to verify a user’s...
ninp0
Dec 13, 20223 min read
4 views
0 comments

All About XSS
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. It allows malicious...
ninp0
Dec 11, 20222 min read
4 views
0 comments

SQL Injection aka SQLi
SQL injection is a type of cyberattack that exploits the vulnerabilities of a website or application to gain access to the backend...
ninp0
Dec 10, 20223 min read
3 views
0 comments

Insecure Open Redirects
Introduction Open redirect attacks are a type of security vulnerability where a malicious actor is able to redirect a user from a...
ninp0
Dec 8, 20223 min read
5 views
0 comments