How to make your team more aware of cybersecurity

Cybersecurity has become an increasingly important issue for companies as the number of cyberattacks continues …

Cross Site Scripting attack and prevention

Cross-Site Scripting ( abbreviated as XSS) attack is the most common application level attack technique …

Content Security Policy (CSP)

Content Security Policy (CSP) is a whitelisting mechanism that allows you to control what behaviour …

Protect nginx server identity

NGINX web server's default configuration allows to return the type and version that it is …

Protecting your organization from DNS infrastructure Hijacking Campaigns

Domain Name System (DNS) infrastructure hijacking is where an attacker using the compromised credentials

How to prevent falling victim to technical support scams

Technical support scams starts with scammers claiming to be associated with companies offering legitimate support …

Improving Website Security by Avoiding Mixed Content

Mixed-Content pages are the web pages that are transmitted over secure HTTPS connection but include

How to control outbound DNS Access

User workstations, tablets and phone may be configured to send DNS requests to servers other …

OS Fingerprinting

An adversary engages in fingerprinting activities to determine the type or version of the operating …

TLS Cipher

Transport Layer Security (TLS) is the cryptography protocol designed to provide data security over network …

How to prevent Ransomeware attack

Ransomware are the computer viruses that prevents you from using your computer unless you do …

PCI DSS High Level Requirements

The goal of the Payment Card Industry Data Security Standard (PCI DSS) is to protect …