Found 689 presentations matching your search
Attack surface
Many cloud breaches come from simple mistakes like misconfigurations, overly broad permissions, or s...
How internet can be secured from hackers, attackers, viruses, spammers, etc and measures to make our...
Learn about session hijacking, a serious cybersecurity threat where attackers steal or manipulate a ...
From LASCON 2022: APIs are a foundational technology in today’s app-driven world and increasingly ...
Adversarial Machine Learning and its future in the world of artificial intillegence. The attackers a...
This attack was made possible due to a programming vulnerability in OpenSSL libraries. The attack wa...
Discover the intricacies of Server-Side Request Forgery (SSRF), a critical vulnerability that allows...
Penetration testing is a simulated cyberattack used to identify vulnerabilities in a system, applica...
If you’re still defending your network without AI — you’re already behind the curve. From aut...
Network Scanning refers to the set of procedures adopted for identifying a network’s hosts, ports ...
Privilege Escalation Techniques: Exploiting System Vulnerabilities for Elevated Access Attackers ca...
Passwords remain one of the most targeted points of entry for attackers. In this module, I explored ...
Cyber security is vital because it covers everything that has to do with protecting our data from cy...
Network and system security are essential in the complex online plays between defenders and attacker...
Conducting penetration testing for websites involves a systematic approach to identify and exploit v...
Microsoft's Threat Matrix for Kubernetes helps organizations understand the attack surface a Kub...
This presentation explores the impact of HTML injection attacks on web applications, detailing how a...
This project focuses on identifying a critical Cross-Site Scripting (XSS) vulnerability present on t...
Compromised credentials have been APT groups’ favorite tool for accessing, propagating and maintai...