Author: Lucian

OPSEC >>

Information Security vs Cyber Security

Cybersecurity is a broad topic that encompasses a large area within the IT security field.…

Defense against Ransomware

Cyber-attacks, malware, and aspects of ransomware Cyber-attacks and data breaches are becoming more common, with…

New Pentesting Tool

Caido- A lightweight web security auditing toolkit Caido is a new lightweight web security auditing…

Google Dorking

Using Google for Advanced Searching What is Google Dorking? Google has a lot of websites…

IDORs: What are they and how to find them

How to find and exploit IDOR vulnerabilities in a web application giving you access to…

Mitigating Malware

What is a computer worm? Is a worm a virus? The answer is No. A…

Viruses, worms, and trojans

  1. Malware End devices such as computers, phones, tablets, and printers are particularly vulnerable…

What kind of hacker are you?

The difference between them What is a hacker? The term ‘hacker’ does not necessarily have…

EU Dora & How to be Compliant

This is how to comply with the new EU regulation. Digital Operational Resilience Act  The…

Google’s Quantum AI – $5 mill project

This is What Happened.   Quantum computers use quantum physics to access computational abilities that…