Top 8 Open Source Web Crawlers in 2021
Top 8 Open Source Web Crawlers in 2021

WEB CRAWLERS Search Engine performs indexing of all web pages in their archive for returning the most relevant and best content-based results to the searched query. The underlying technique or…

Read More
Definition and Example of security.txt
Definition and Example of security.txt

Imagine that a security expert found a security vulnerability on your company's website and wants to report it to you. Searching your social media accounts to deliver this report to…

Read More
5 Steps of Vulnerability Assessment Report and How to Write an Assessment Report?
5 Steps of Vulnerability Assessment Report and How to Write an Assessment Report?

Vulnerability assessment is the process that determines the risks and threats in your system by using automatic software. With this assessment, the vulnerabilities, configuration errors, and certain failures in the target…

Read More
Lightweight Cryptology Standardization
Lightweight Cryptology Standardization

  Standard cryptology methods are well designed for desktop or server environments, so they are applicable for old systems. But today's technology evolves on small devices that connect with each…

Read More
Zero Trust Architecture
Zero Trust Architecture

Zero Trust is a security model introduced in 2010 by John Kindervag, a former Forrester analyst. Since then, Zero Trust has become one of the most common patterns in cybersecurity.…

Read More
The History Of Bug Bounty Program
The History Of Bug Bounty Program

Today, bug bounty programs are an increasingly common method to find and fix various vulnerabilities on the Internet. This method is used by small companies, as well as large companies…

Read More
Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472
Zerologon Vulnerability: Becoming a domain admin in 10 seconds CVE-2020-1472

A security firm named Secura has published a white paper of a vulnerability (CVE-2020-1472) affecting Microsoft's Netlogon authentication component. The vulnerability allows unauthorized code execution on…

Read More
Security Issues in Deep Learning
Security Issues in Deep Learning

Developments in deep learning and artificial intelligence making our lives easier day by day. They are suggesting what we want to buy, driving our cars, optimizing traffic, taking care of…

Read More