Search


Lock Picking Village as a Team Building Activity
Team building is an important way for organizations to strengthen their relationships, strengthen bonds and build trust within the team....

ninp0
Dec 27, 20223 min read
Â
Â
Â


How AI is Changing Offensive Security
Introduction: In this blog post, we will explore how artificial intelligence (AI) and machine learning (ML) can be used to improve...

ninp0
Dec 26, 20222 min read
Â
Â
Â


Safe Cracking - The Art of Manipulation
Introduction Safe cracking is a skill that has been around for centuries. It is an art that requires a combination of knowledge, skill,...

ninp0
Dec 25, 20222 min read
Â
Â
Â


Fuzz Testing for Software Resiliency
1. Introduction to Fuzz Testing: What is it & What Benefits Does It Bring? Fuzz testing is a type of software testing that uses invalid,...

ninp0
Dec 25, 20222 min read
Â
Â
Â


DOM-Based Blind XSS
DOM-Based Blind XSS DOM-based Blind XSS (Document Object Model-based Blind Cross-Site Scripting) is one of the most dangerous and...

ninp0
Dec 25, 20222 min read
Â
Â
Â


Importance of DevSecOps in an Organization
Introduction DevSecOps is an important step to achieving the ultimate goal of any business – continual security and delivery excellence....

ninp0
Dec 24, 20223 min read
Â
Â
Â


Importance of SAST & DAST Security within Your Organization
Technology is a critical part of our everyday lives, and the need for robust security measures that safeguard digital assets has never...

ninp0
Dec 23, 20223 min read
Â
Â
Â


Introduction to Continuous Penetration Testing
We have all heard of mainstream cyber security practices such as firewalls and antivirus software. These are traditional security...

ninp0
Dec 22, 20222 min read
Â
Â
Â


Wardialing: Increase Telecommunication & Network Security with Proactive Testing
Page 1: Introduction to Wardialing Assessments When it comes to computer security, proactive monitoring and assessment should be one of...

ninp0
Dec 21, 20223 min read
Â
Â
Â


Smashing the Stack
Introduction Stack overflow vulnerabilities are a type of software security vulnerability that occurs when a program attempts to write...

ninp0
Dec 20, 20223 min read
Â
Â
Â


Format String Vulnerabilities
Format String Vulnerabilities Format string vulnerabilities are one of the most common security flaws in software applications. They...

ninp0
Dec 19, 20222 min read
Â
Â
Â


Integer Underflow Vulnerabilities
Integer Underflow Vulnerabilities Integer underflow vulnerabilities are a type of software vulnerability that can be exploited to cause a...

ninp0
Dec 18, 20222 min read
Â
Â
Â


Heap Overflows
Introduction Heap overflow vulnerabilities are a type of memory corruption vulnerability that occurs when a program allocates memory from...

ninp0
Dec 17, 20223 min read
Â
Â
Â


Integer Overflow Vulnerabilities
Integer Overflow Vulnerabilities Integer overflow vulnerabilities are a type of software vulnerability that can occur when a program does...

ninp0
Dec 16, 20222 min read
Â
Â
Â


Heap Spraying
Heap Spraying: An Overview Heap spraying is a method of exploiting computer software vulnerabilities which allows an attacker to execute...

ninp0
Dec 15, 20222 min read
Â
Â
Â


Web Cache Deception
Introduction Web cache deception is an increasingly common practice used by malicious actors to manipulate the content of a website and...

ninp0
Dec 14, 20223 min read
Â
Â
Â


How Threat Actors Bypass Multi-Factor Authentication
Introduction Multi-factor authentication (MFA) is a security system that requires more than one form of authentication to verify a user’s...

ninp0
Dec 13, 20223 min read
Â
Â
Â


All About XSS
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. It allows malicious...

ninp0
Dec 11, 20222 min read
Â
Â
Â


SQL Injection aka SQLi
SQL injection is a type of cyberattack that exploits the vulnerabilities of a website or application to gain access to the backend...

ninp0
Dec 10, 20223 min read
Â
Â
Â


Insecure Open Redirects
Introduction Open redirect attacks are a type of security vulnerability where a malicious actor is able to redirect a user from a...

ninp0
Dec 8, 20223 min read
Â
Â
Â

