Published inInfoSec Write-upsBrand-new prototype pollution gadget in MongoDB leading to RCEJun 17, 2024Jun 17, 2024
Kiber təhlükəsizliyə yeni başlayanlar üçün tez-tez verilən suallar 2 | FAQ for beginners in cyber…Kiber təhlükəsizlikdə FAQ seriyasının ikinci bölümünə xoş gəlmisiniz. Bu yazımda sahəyə yeni başlayanların tez-tez soruşduğu bir sıra…May 1, 20241May 1, 20241
Unveiling the dark side of development: time or security?The main obstacle in cyber security is that it’s often perceived as a roadblock rather than an essential component of a successful…Feb 8, 2024Feb 8, 2024
3 banking security mistakes to avoid for a safer digital experienceBanking has gained wide adoption in Azerbaijan and around the world in recent times, bringing us closer to eliminating the cash…Jun 8, 2023Jun 8, 2023
You’re not as safe as you think: Here’s why you may be the next target of a cyber criminalDo you still believe hackers are only interested in spying on celebrities’ lives or stealing money from well-known companies? You might…Apr 23, 2023Apr 23, 2023
Kiber təhlükəsizliyə yeni başlayanlar üçün tez-tez verilən suallar | FAQ for beginners in cyber…Kiber təhlükəsizlik sahəsində işləmək üçün nələri bilməliyəm? Proqramlaşdırmanı öyrənmək vacibdir mi? Özümü inkişaf etdirmək üçün hansı…Feb 13, 20231Feb 13, 20231
From chaos to peace: the life-changing benefits of being organizedAlmost everyday, we see posts on social media explaining why you need to be organized in order to be successful. I have also seen some…Feb 9, 2023Feb 9, 2023
Why does cyber security matter for your business?There is a saying that goes: “No business is too small to be hacked”.Jan 20, 2023Jan 20, 2023
Published inSystem WeaknessSecurity risks of ChatGPT — should we trust it?Lots of people around the world got immersed in ChatGPT playground since its release on November 2022, using its awesome features for…Jan 3, 2023Jan 3, 2023
Published inSystem WeaknessData exfiltration using ExcelHi folks, in this article, I’m going to talk about a new data exfiltration technique, which allows to read files on victim’s machine using…Nov 10, 2022Nov 10, 2022