AWS Penetration Testing

AWS Penetration Testing What is AWS Penetration Testing? Penetration testing methods and policies differ based on the organization that you’re in. Some organizations allow more freedoms while others have more protocols built in. When you are doing pen testing in AWS, you have to work within the policies that AWS allows you to because they […]
7 Security Awareness Tips

In this article, we will give you a few tips on how you can stay safe from cyber attacks. Follow A Clean Desk Policy Following a clean desk policy will help reduce the risk of information theft, fraud, or a security breach caused by sensitive information being left in plain view. When leaving your desk, […]
Debunking Common Cybersecurity Myths

Debunking Common Cybersecurity Myths Table of Contents Article Introduction There are many misconceptions about cyber security at home and at the workplace. Some people think they just have to install antivirus software on their computers to protect them from hackers. Having Antivirus software is a good thing but it cannot guarantee you from getting hacked. […]
WHOIS vs RDAP

WHOIS vs RDAP What is WHOIS? Most website owners include a means to contact them on their website. It could be an email, an address, or a phone number. However, many don’t. Moreover, not all internet resources are websites. One would usually need to do extra work using tools like myip.ms or who.is to find […]
API Load Testing With Locust

API Load Testing With Locust API Load Testing With Locust: Intro You’ve probably been in this situation before: you write code that does something, an endpoint for example. You test your endpoint using Postman or Insomnia, and everything works fine. You pass on the endpoint to the client-side developer, who then consumes the API and […]
Top OAuth API Vulnerabilities

Top OATH API Vulnerabilities Top OATH API Vulnerabilities: Intro When it comes to exploits, APIs are the greatest place to start. API access usually consists of three parts. Clients are issued tokens by an Authorization Server, which runs alongside APIs. The API receives access tokens from the client and applies domain-specific authorization rules based on […]