Knowledge Base
How can we help?
- VPN
- XML External Entities (XXE)
- Vulnerable and Outdated Components
- SQL Injection (SQLi)
- Spoof
- SMTP
- Smishing
- Session Token
- Session Hijacking
- Session Expiration / Session Timeout
- Server-Side
- Security Misconfiguration
- Red Team Test
- Ransomware
- Phishing
- Pentest
- Patching
- Open Source Intelligence (OSINT)
- Man in the Middle Attack (MiTM)
- IP Address
- IoT
- Internal IP Address
- Insufficient Logging & Monitoring
- Injection
- Incident Response (IR)
- HTTPS
- HTTP
- Expired Certificate
- Ethical Hacking
- End of Life (EOL)
- Encryption
- Domain Administrator (DA)
- DNS Amplification Attack
- DNS
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Dark Web
- Cross-Site Scripting (XSS)
- Cross-Site Request Forgery (CSRF)
- Client-Side
- Clickjacking
- Certificate Authority (CA)
- Captcha
- Caching
- Brute-Force Attack
- Broken Authentication
- Broken Access Control
- Authentication Bypass
- API
- The Naughty List: Top Cyber Threats to Avoid This Christmas
- Don't be sorry, be safe- Essential tips for SMEs to Secure the Hybrid/Remote Working Model
- Social Engineering
- Data Breaches: A Persistent Concern in Today’s Digital World!
- Navigating Cloud Security Challenges and Solutions
- Strengthening your business: Introducing our comprehensive security audit
- The Rise of Automation
- Targeted Ransomware
- What is the OWASP 10 and why is it important?
- What is pentesting and why do you need it?
- The Rise of Cybercrime in 2023!
- What is Web Application Scanning?