Welcome to my Cybersecurity Blog!

AI is Redefining the Search Engines

AI is a Game Changer for Search Engines and SEO Future As digital gatekeepers, search engines like Google and Bing define online visibility, driving...

Information Security vs Cyber Security

Cybersecurity is a broad topic that encompasses a large area within the IT security field. I published a short but meaningful article to get an...

Defense against Ransomware

Cyber-attacks, malware, and aspects of ransomware Cyber-attacks and data breaches are becoming more common, with perpetrators becoming increasingly...

Caido – A lightweight web security auditing toolkit

Caido – A lightweight web security auditing toolkit Caido is a new lightweight web security auditing toolkit designed to make professional-grade...

Google Dorking

Using Google for Advanced Searching What is Google Dorking? Google has a lot of websites that have been crawled and indexed. Your average Joe uses...

IDORs: What are they and how to find them

How to find and exploit IDOR vulnerabilities in a web application giving you access to data you shouldn’t have...

Mitigating Malware

Is a worm a virus? The answer is No. A worm is not a virus, although, like a virus, it can severely disrupt IT operations and cause data loss. A worm...

Viruses, worms, and trojans

  1. Malware End devices such as computers, phones, tablets, and printers are particularly vulnerable to malware attacks. Therefore, this topic...

What kind of hacker are you?

The difference between them What is a hacker? The term ‘hacker’ does not necessarily have a negative connotation. For the original generation of...