I am a Cybersecurity Professional, safeguarding the digital future, one byte at a time.
Mapping Cyber Threats and Threat Actors · In today's interconnected digital world, the ever-evolving landscape of cyber threats poses a significant...
What is SQL Injection ? · SQL Injection Attack: What is it, and how can we defend ourselves from it? SQL Injection is a vulnerability where attackers...
What is Vulnerability? · Let's define vulnerability first. What is vulnerability? Well, according to ISO 27001, vulnerability is a weakness of an asset...