30 cybersecurity search engines

Here are 30 cybersecurity search engines that i liked in my learning: Dehashed—View leaked credentials.SecurityTrails—Extensive DNS data.DorkSearch—Really fast Google dorking.ExploitDB—Archive of various exploits.ZoomEye—Gather information about target...

17 Free Cybersecurity learning platforms

Here are 17 platforms where you can begin learning cybersecurity: HackXpert - Free labs and training.TryHackMe - Hands-on exercises and labs. CyberSecLabs - High quality training labs.Cybrary - Videos, labs, and practice exams.LetsDefend - Blue team tr...

MFA Fatigue

What is MFA Fatigue? If you haven’t heard about CISCO cyber breach, it has also become a reality. With the other security incidents such as the recent Solarwinds cyberattack, cybercriminals have established again that not even best tech companies ar...

How to secure your android device?

Introduction Android is am opensource mobile operating system. If you are here reading this then you would really know what is android and does not need introduction of android in detail. But what most dont kow compared to iOS android also strives to b...

How to defend against "Zero-day" attacks?

One attack that no one can predict the impact and criticality are the Zero day attacks. It is important to understand and know how to be prepared for "Zero-day" attacks once it is published. Let us look into details. What are "Zero-day Attacks"? Zero-d...

Pegasus, the Spyware - A quick introduction

With all the craziness going around pegasus. Let us have a quick look about it. What is Pegasus Software?It is basically a spyware which can secretly be installed on a smartphones(apple or android) by exploiting a Zero day vulnerabilities. The installe...