WEB VAPT TOOLS COMPARISON Web Application VAPT is security testing methods for security holes or […]
Network VAPT Tools Comparison
Network VAPT tools Comparison Network VAPT is the assessment procedure that is conducted by safety […]
Patch management tricks and techniques
I. What is a patch? In technical terms, “Patch” are the changes performed on a […]
Why HIPAA and GDPR cannot replace each other
Why HIPAA and GDPR cannot replace each other? Its a misconception that GDPR and HIPAA […]
Is that mobile app safe to use?
Would you readily give your residential address to a stranger? No? Aren’t you extra cautious […]
Cyber Security Webinar – Working From Home – For Senior Management
Cyber Security Tips – Working From Home For Senior Management Note – Enable sound – […]
Penetesting Industry 4.0 IoT Prototype – 5
Here is the collection of videos of previous 4 articles. These videos show in steps […]
Penetesting Industry 4.0 IoT Prototype – 4
Must have security measures for Industry 4.0 Firmware integrity and secure boot: Secure boot uses […]
Penetesting Industry 4.0 IoT Prototype – 3
Step 3: Hosting the payload on a Website To host the payload, we use the […]
Penetesting Industry 4.0 IoT Prototype – 2
Remotely Hacking into Raspberry Pi Step 1: Creating a TCP Tunnel The first step to […]