Suraj wani🛡️How do I get started in cyber security in 2024?Hello to all of you who reading this blog This is my blog on Medium. I hope you enjoy it.Apr 18Apr 18
Suraj wani🛡️Types of Web Application Attacks— — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — — -Oct 25, 2023Oct 25, 2023
Suraj wani🛡️Types of Malware:-In today’s digital age, the threat of malware attacks will only continue to increase. This increase can make it challenging for businesses…Oct 18, 2023Oct 18, 2023
Suraj wani🛡️What is the Zero Day Attack?Zero-day attacks are a type of advanced cyber threat. They take advantage of security flaws in software that are unknown to the software’s…Oct 18, 2023Oct 18, 2023
Suraj wani🛡️A list of SANS TOP 25The SANS top 25 vulnerabilities are created through multiple surveys and individual interviews with developers, senior security analysts…Oct 10, 2023Oct 10, 2023
Suraj wani🛡️what is CVE, CWE and NVD ?CVE, CWE, and NVD are all related to computer security and are used to identify and address vulnerabilities in software and hardware…Oct 10, 2023Oct 10, 2023
Suraj wani🛡️Top 14 Vulnerability Scanners tools for Cybersecurity Professionals (Netwwork Scanning Tools)Vulnerability scanners are valuable tools that search for and report on what known vulnerabilities are present in an organization’s IT…Oct 1, 2023Oct 1, 2023
Suraj wani🛡️INFORMATION GATHERING TOOLSAs part of the hacking or penetration testing phase, the second phase is information gathering, and it is critical to understand the…Sep 24, 2023Sep 24, 2023
Suraj wani🛡️Understanding the Basics of Footprinting and ReconnaissanceWhat is network footprinting?”Sep 24, 2023Sep 24, 2023